- Joined
- Mar 23, 2016
- Messages
- 4,839 (1.64/day)
Processor | Ryzen 9 5900X |
---|---|
Motherboard | MSI B450 Tomahawk ATX |
Cooling | Cooler Master Hyper 212 Black Edition |
Memory | VENGEANCE LPX 2 x 16GB DDR4-3600 C18 OCed 3800 |
Video Card(s) | XFX Speedster SWFT309 AMD Radeon RX 6700 XT CORE Gaming |
Storage | 970 EVO NVMe M.2 500 GB, 870 QVO 1 TB |
Display(s) | Samsung 28” 4K monitor |
Case | Phantek Eclipse P400S (PH-EC416PS) |
Audio Device(s) | EVGA NU Audio |
Power Supply | EVGA 850 BQ |
Mouse | SteelSeries Rival 310 |
Keyboard | Logitech G G413 Silver |
Software | Windows 10 Professional 64-bit v22H2 |
Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target’s isolated network.
This type of attack scenario — codenamed HVACKer by its creators — relies on custom-built malware that is capable of interacting with a computer’s thermal sensors to read temperature variations and convert these fluctuations into zeros and ones — binary code.
The malware, already installed on a computer on an isolated network with no Internet access, reads the temperature variations created by the HVAC system and converts the received thermal signals into malicious operations.
Source: Bleeping Computer
Edit:
According to tests carried out by the research team, they were able to send data inside an air-gapped network via HVAC systems at bit rates of 40 bits per second, a more than acceptable transmission speed.
How could they manage to obtain a transfer rate of 40 bits per second? Seems highly improbable.
Last edited: