New technique can hack even computers completely isolated from the internet
Security researchers at the Department of Software Engineering and Information Systems, Ben-Gurion University in the Negev, Israel, have just discovered a new hacking technique and they named it SATAn.
Looking at the name, you can probably guess that this hack technique is related to the SATA storage interface. Basically, the SATAn hacking technique can allow hackers to attack even computers that are completely isolated from the internet (air-gapped computers). To do that, the hacker uses a SATA cable as a wireless antenna to transmit data and information from the compromised computer to a nearby receiver.
Air-gapped computers are essentially lonely devices because they are not part of any network. They are isolated from insecure connections, such as the internet, to ensure the safety of the data stored inside.
While studying SATAn, the researchers discovered that data travels over SATA cables most efficiently around the 6 GHz frequency band.
"Although air-gapped computers have no connection to the internet, attackers can use a SATA cable as a wireless antenna to transmit radio signals in the 6 GHz band.
Serial ATA (SATA) is a bus interface that is widely used in modern computers and mainly connects to mass storage devices. The popularity of the SATA interface makes it easy for hackers to perform SATAn attacks in a variety of computer systems and IT environments ," the researchers shared.
Of course, the researchers did not share the details of the attack nor the SATAn approach. However, to be successful, the hacker will most likely have to have physical contact with the air-gapped computer. The way to attack SATAn is certainly not simple, so it will only be a threat to air-gapped computer systems that store classified information.
You should read it
- This USB cable can turn a normal Linux laptop into a 'brick'.
- How to hack WiFi passwords with holes on WPA / WPA2
- Distinguish common types of computer cables
- 8 best Wifi analysis and hacking software
- Basic Hack Techniques - Part I
- Learn about SQL Injection and how to prevent it
- How to Speed Hack or Break Through Walls in ROBLOX
- Test knowledge about hacking
- How to Unauthorized Access (Hack) a website
- Has Hack Free Fire been locked?
- So frustrated with the learning situation, students hack the school's computer system
- How to hack name in Among Us, naming tips Among Us
Maybe you are interested
Hydrogen trains run 2,800km on just one tank of fuel 10 Proven Strategies for Boosting Your Online Advertising Campaigns How to use Local Group Policy Editor to tweak your computer SEO - The cheapest, highly effective online marketing Top 10 cheap Android phones in Vietnam Google Contributor supports removing Google ads