{"id":77994,"date":"2018-04-22T19:02:55","date_gmt":"2018-04-23T02:02:55","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2018\/04\/powerhammer-is-wake-up-call-to-data-stealing-through-power-lines"},"modified":"2018-04-22T19:02:55","modified_gmt":"2018-04-23T02:02:55","slug":"powerhammer-is-wake-up-call-to-data-stealing-through-power-lines","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2018\/04\/powerhammer-is-wake-up-call-to-data-stealing-through-power-lines","title":{"rendered":"PowerHammer is wake-up call to data-stealing through power lines"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/powerhammer-is-wake-up-call-to-data-stealing-through-power-lines2.jpg\"><\/a><\/p>\n<p>I remember this was like the plot to the Al Pacino CIA movie from the \u201890\u2019s. Guess they actually figured out how to dial in on power lines.<\/p>\n<hr>\n<p>Can security sleuths ever complain there\u2019s nothing left to do? The answer is obvious, and one more path to mischief has been recognized in the form of power supplies serving as a data exfiltration tool. It appears that malware using power lines could exfiltrate data from air-gapped computers.<\/p>\n<p>Researchers from the Ben-Gurion University of the Negev discovered malware that nabs data through <a href=\"https:\/\/techxplore.com\/tags\/power\/\" rel=\"tag\" class=\"\">power<\/a> lines.<\/p>\n<p>\u201cPowerHammer works by infecting an air-gapped computer with malware that intentionally <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/researchers-create-malware-that-steals-data-via-power-lines\/\">alters<\/a> CPU utilization levels to make the victim\u2019s computer consume more or less electrical power,\u201d said Catalin Cimpanu, <i>BleepingComputer<\/i>. Wait, air-gapped computers?<\/p>\n<p><!-- Link: <a href=\"https:\/\/techxplore.com\/news\/2018-04-powerhammer-wake-up-data-stealing-power-lines.html\">https:\/\/techxplore.com\/news\/2018&#45;04-powerhammer-wake-up-...lines.html<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I remember this was like the plot to the Al Pacino CIA movie from the \u201890\u2019s. Guess they actually figured out how to dial in on power lines. Can security sleuths ever complain there\u2019s nothing left to do? The answer is obvious, and one more path to mischief has been recognized in the form of [\u2026]<\/p>\n","protected":false},"author":359,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-77994","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/77994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/359"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=77994"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/77994\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=77994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=77994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=77994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}