New technique can hack even computers completely isolated from the internet

Looking at the name, you can probably guess that this hack technique is related to the SATA storage interface. Basically, the SATAn hacking technique can allow hackers to attack even computers that are completely isolated from the internet (air-gapped computers). To do that, the hacker uses a SATA cable as a wireless antenna to transmit data and information from the compromised computer to a nearby receiver.

New technique can hack even computers completely isolated from the internet Picture 1

Air-gapped computers are essentially lonely devices because they are not part of any network. They are isolated from insecure connections, such as the internet, to ensure the safety of the data stored inside.

While studying SATAn, the researchers discovered that data travels over SATA cables most efficiently around the 6 GHz frequency band.

"Although air-gapped computers have no connection to the internet, attackers can use a SATA cable as a wireless antenna to transmit radio signals in the 6 GHz band.

Serial ATA (SATA) is a bus interface that is widely used in modern computers and mainly connects to mass storage devices. The popularity of the SATA interface makes it easy for hackers to perform SATAn attacks in a variety of computer systems and IT environments ," the researchers shared.

Of course, the researchers did not share the details of the attack nor the SATAn approach. However, to be successful, the hacker will most likely have to have physical contact with the air-gapped computer. The way to attack SATAn is certainly not simple, so it will only be a threat to air-gapped computer systems that store classified information.

4 ★ | 1 Vote

May be interested

  • Connect your computer to the InternetConnect your computer to the Internet
    you want internet access at home so you can send and receive email, browse the web, find information
  • Fix Internet connection after virus infectionFix Internet connection after virus infection
    this is the most common case of computers after and after being infected with a virus. even if the virus is completely removed from the system, you still cannot connect to the internet.
  • Supercomputers can completely detect cyber threatsSupercomputers can completely detect cyber threats
    as governments, businesses and individual users increasingly trust and use the internet for their daily activities, maintaining cybersecurity will still be an essential task for researchers. as well as security experts worldwide.
  • Hackers hide stolen credit card data in JPG fileHackers hide stolen credit card data in JPG file
    we all know that the cybercrime world is constantly moving, parallel and has a close relationship with the development of the internet in general. that is why new hacking techniques, more sophisticated phishing techniques, are constantly being introduced by cybercriminals.
  • 8 best Wifi analysis and hacking software8 best Wifi analysis and hacking software
    pentest security analysis and security evaluation is an integral part of creating any kind of secure network. to create a secure network, developers use wi-fi hacking software to test wireless networks and make modifications. this article will introduce you to the best hacking and analyzing wi-fi tools.
  • How to hack name in Among Us, naming tips Among UsHow to hack name in Among Us, naming tips Among Us
    with these hack style names in among us, you will make the discussion messed up with funny and unpredictable names.
  • How to Hack Into a School ComputerHow to Hack Into a School Computer
    this wikihow teaches you how to gain administrator permissions on a school pc. in the unlikely event that your school uses mac computers instead of windows computers, you will not be able to hack into the computer. keep in mind that if...
  • The most basic insights to becoming a Hacker - Part 5The most basic insights to becoming a Hacker - Part 5
    what is tcp / ip packet tcp / ip stands for transmission control protocol and internet protocol, a tcp / ip packet is a block of compressed data, then attaches a header and sends it to another computer. this is how the internet transmits, by sending packets. the header in a packet contains the ip address of the sender.
  • How does human body change in Mars?How does human body change in Mars?
    after settling down in mars, completely isolated, the different and harsh natural environment can become a completely new type of person.
  • 4 ways to hack Facebook you should know to protect your Facebook account4 ways to hack Facebook you should know to protect your Facebook account
    people use facebook as a tool to connect, but there are people who use this connection for bad purposes. this article will show you how to hack facebook and how to prevent it to protect your facebook account.