Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Pentest Tool TeamFiltration Hits Entra ID

June 12, 2025
Reading Time: 2 mins read
in Alerts
SmartAttack Uses Sound To Steal PC Data

A new attack dubbed ‘SmartAttack’ uses smartwatches as a covert ultrasonic signal receiver to exfiltrate sensitive data from isolated systems. These air-gapped systems are commonly deployed in mission-critical environments such as various government facilities and nuclear power plants. Despite this physical isolation, they remain vulnerable to compromise through various insider threats like rogue employees using USB drives. Once infiltrated, malware can operate covertly, using stealthy techniques to modulate the physical characteristics of internal hardware components. This allows it to transmit sensitive data to a nearby receiver without interfering with the system’s normal daily operations.

The SmartAttack method requires malware to somehow infect an air-gapped computer to first gather sensitive information such as keystrokes.

It can then use the computer’s built-in speaker to emit special ultrasonic signals into the immediate surrounding environment. By using a binary frequency shift keying modulation, the audio signal frequencies can then represent binary data. A frequency of 18.5 kHz represents “0,” while 19.5 kHz denotes a “1,” allowing for data encoding in the signal. Frequencies at this range are inaudible to humans but can still be caught by a smartwatch microphone worn by a nearby person.

The researchers who developed this attack note that smartwatches use small, lower-SNR microphones compared to typical modern smartphones. This makes the signal demodulation process quite challenging, especially at higher frequencies and also at much lower signal intensities. Even the orientation of the wearer’s wrist was found to play a crucial role in the overall feasibility of this attack. It was found to work best when the watch has a direct “line-of-sight” with the computer speaker that is emitting the signal.

The maximum transmission range is between six and nine meters, and the data transmission rate ranges from 5 to 50 bits per second.

The security researchers say the best way to counter the SmartAttack is to prohibit the use of smartwatches in secure environments. Another effective defensive measure would be to completely remove the in-built speakers from all of the air-gapped computer machines. This particular step would effectively eliminate the entire attack surface for all possible acoustic covert channels, not just this SmartAttack. If none of these security measures are feasible for an organization, then ultrasonic jamming through the emission of broadband noise. Software-based firewalls and a technique known as audio-gapping could still prove to be very effective at mitigating this threat.

Reference:

  • TeamFiltration A Pentest Tool Turned Weapon In Microsoft Entra ID Attacks
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityFIN6June 2025More Eggs
ADVERTISEMENT

Related Posts

BEARDSHELL and COVENANT Malware Uncovered

BEARDSHELL and COVENANT Malware Uncovered

June 24, 2025
New Malware Skims WordPress E-commerce Sites

New Malware Skims WordPress E-commerce Sites

June 24, 2025
Chinese Hackers Build Router Spy Network

Chinese Hackers Build Router Spy Network

June 24, 2025
Stealth Malware Targets Fortinet Firewalls

Spyware in App Stores Steals Your Photos

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Stealth Malware Targets Fortinet Firewalls

June 23, 2025

Latest Alerts

Chinese Hackers Build Router Spy Network

New Malware Skims WordPress E-commerce Sites

BEARDSHELL and COVENANT Malware Uncovered

Prometei Botnet Attacks Servers for Crypto

Spyware in App Stores Steals Your Photos

Stealth Malware Targets Fortinet Firewalls

Subscribe to our newsletter

    Latest Incidents

    Hacken Token Crashes 99 Percent After Hack

    Paraguayan Government Hit By Cyberattack

    Hackers Leak Saudi Games Athlete Data

    Aflac Hacked in Spree on Insurance Firms

    CoinMarketCap Doodle Hack Steals Crypto

    UK’s Oxford Council Legacy Systems Breached

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial