Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

SmartAttack Uses Sound To Steal PC Data

June 13, 2025
Reading Time: 2 mins read
in Alerts
SmartAttack Uses Sound To Steal PC Data

A new attack dubbed ‘SmartAttack’ uses smartwatches as a covert ultrasonic signal receiver to exfiltrate sensitive data from isolated systems. These air-gapped systems are commonly deployed in mission-critical environments such as various government facilities and nuclear power plants. Despite this physical isolation, they remain vulnerable to compromise through various insider threats like rogue employees using USB drives. Once infiltrated, malware can operate covertly, using stealthy techniques to modulate the physical characteristics of internal hardware components. This allows it to transmit sensitive data to a nearby receiver without interfering with the system’s normal daily operations.

The SmartAttack method requires malware to somehow infect an air-gapped computer to first gather sensitive information such as keystrokes.

It can then use the computer’s built-in speaker to emit special ultrasonic signals into the immediate surrounding environment. By using a binary frequency shift keying modulation, the audio signal frequencies can then represent binary data. A frequency of 18.5 kHz represents “0,” while 19.5 kHz denotes a “1,” allowing for data encoding in the signal. Frequencies at this range are inaudible to humans but can still be caught by a smartwatch microphone worn by a nearby person.

The researchers who developed this attack note that smartwatches use small, lower-SNR microphones compared to typical modern smartphones. This makes the signal demodulation process quite challenging, especially at higher frequencies and also at much lower signal intensities. Even the orientation of the wearer’s wrist was found to play a crucial role in the overall feasibility of this attack. It was found to work best when the watch has a direct “line-of-sight” with the computer speaker that is emitting the signal. The maximum transmission range is between six and nine meters, and the data transmission rate ranges from 5 to 50 bits per second.

The security researchers say the best way to counter the SmartAttack is to prohibit the use of smartwatches in secure environments.

Another effective defensive measure would be to completely remove the in-built speakers from all of the air-gapped computer machines. This particular step would effectively eliminate the entire attack surface for all possible acoustic covert channels, not just this SmartAttack. If none of these security measures are feasible for an organization, then ultrasonic jamming through the emission of broadband noise. Software-based firewalls and a technique known as audio-gapping could still prove to be very effective at mitigating this threat.

Reference:

  • SmartAttack Turns Smartwatches Into Spies For Air Gapped System Data Theft
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityFIN6June 2025More Eggs
ADVERTISEMENT

Related Posts

Wing FTP Server RCE Flaw Exploited

WinRAR Zero-Day Exploit $80K on Dark Web

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Google Gemini Flaw Hijacks Email Summaries

July 14, 2025
Wing FTP Server RCE Flaw Exploited

Wing FTP Server RCE Flaw Exploited

July 14, 2025
Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025

Latest Alerts

WinRAR Zero-Day Exploit $80K on Dark Web

Google Gemini Flaw Hijacks Email Summaries

Wing FTP Server RCE Flaw Exploited

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

Subscribe to our newsletter

    Latest Incidents

    Supermarket Cyberattack Prompts Warning

    China Hacker Suspected in DC Law Firm Breach

    nius.de Cyberattack Leaks User Data

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial