The Ben-Gurion University of the Negev Cyber Security Research Center in Israel published some papers with the aid of a group of scientists in this center for the purpose of mentioning how to Faraday Cage protected devices. The team mentioned an outbreak in how to hack such systems.
Faraday cage, or Faraday Shield, hinders electromagnetic fields circulating by having a metallic shielding. Built in charges in the metallic shield cancel any electrical charges approaching the system from any external electromagnetic radiation. Such method is meant to protect electronics from RFI since they are sensitive to such radiation. Moreover, Faraday cages are capable of shielding the devices that produce RFI themselves like radio transmitters. Accordingly, a lot of banks use Faraday-shielded rooms in order to maximize protection of servers.
MAGNETO and ODINI
The Israel group claimed that this protection can be used in evil matters. Such shielding could be sometimes used to steal personal information with two techniques: MAGNETO and ODINI. They both make use of air-gapped installed malware in a Faraday cage in order to have dominance by controlling the magnetic field radiated from PCs. Then, the computer has binary data that are encoded in the magnetic field frequencies, which penetrate Faraday cages responsible about shielding them. The team responded by claiming that:
“Moving charges in a wire generate a magnetic field. The magnetic field changes according to the acceleration of the charges in the wire. In a standard computer, the wires that supply electricity from the main power supply to the motherboard are the primary source of the magnetic emanation. The CPU is one of the largest consumers of power in the motherboard. Since modern CPUs are energy efficient, the momentary workload of the CPU directly affects the dynamic changes in its power consumption. By regulating the workload of the CPU, it is possible to govern its power consumption, and hence to control the magnetic field generated. In the most basic case, overloading the CPU with calculations will consume more current and generate a stronger magnetic field. By intentionally starting and stopping the CPU workload, we can generate a magnetic field at the required frequency and modulate binary data over it.”
The List of Impressive Hacks Grows
• 9-1-1 DDoS
• Unnamed attack
• Shattered Trust
Related Article: IoT DDoS Botnet Offered by Gaming Company