Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Can Now Use Radio Signals to Steal Corporate Data

b2ap3_thumbnail_radio_signal_hacker_400.jpgHackers are always coming up with new, unprecedented methods of hacking unsuspecting victims. Despite their best efforts, technology professionals have managed to keep up with threats, but this only forces threats to continue to innovate. In fact, some hackers are even capable of using radio signals to hack into an unconnected device and steal confidential corporate data.

Researchers in Israel have developed a technology that extracts information from a machine using radio frequencies and wireless communications. This might not sound intimidating at first, but what if we mention that these attacks can target isolated machines that have no connection to the Internet or your network at all? These types of disconnected devices are often in such high-security locations that employees aren’t even allowed to bring their mobile phones anywhere near the machine. Such powerful security measures should be enough to protect this data from just about anything--everything except radio signals.

The researchers in question have proven that these methods can be, and already have been, used to siphon data from disconnected devices. Cyber Security Labs at Ben Gurion University have dubbed this technique “AirHopper.” By using radio frequencies, the researchers succeeded in leaking information from isolated machines via their transceiver. This is one of the methods the NSA used to spy on foreign countries.

While the researchers haven’t explicitly stated that they use the same method as the NSA, it’s still very similar in nature. They created a malware that can be sent by a mobile phone’s FM transmitter; from there, in theory, it can infect other devices in range. Infected devices then proceed to generate more radio frequencies to infect other devices in range. According to WIRED magazine:

The data can be picked up by a mobile phone up to 23 feet away and then transmitted over Wi-Fi or a cellular network to an attacker’s command-and-control server. The victim’s own mobile phone can be used to receive and transmit the stolen data, or an attacker lurking outside an office or lab can use his own phone to pick up the transmission.

This kind of technique is, without a doubt, complex. Only the most skilled hackers have any hopes of pulling something like this off. However, it should be noted that it’s not as unlikely as any other advanced hacking attack from being exploited. The most likely way this kind of threat can attack a disconnected system is through a USB device or flash drive, which significantly limits the potential for attacks. Only those who have physical access to the machine would have any chance to infect it, even unknowingly, but this doesn’t mean you should let your guard down.

In fact, the importance of monitoring your IT infrastructure for discrepancies can’t be emphasized enough. Limiting who has access to mission-critical disconnected and connected technology is the first step toward protecting any information stored on it. Using secure USB devices is another necessary step which can prevent potential hacking attacks from occurring. Data leakage is a primary concern for all businesses, and your business could be held liable if sensitive information is stolen. In order to prevent these catastrophes, your business should be prepared to maximize security.

Voyage Technology’s remote monitoring solution is specifically designed so that we keep an eye out for suspicious activity. We’ll take the necessary precautions and neutralize threats before they cause irreparable damage. Give us a call at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Phishing Email Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Cybersecurity Microsoft Small Business Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Smartphones Android VoIP Business Management communications Mobile Devices Upgrade Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office Tech Term Remote Current Events Network Productivity Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Gadgets AI Covid-19 Miscellaneous Server Managed Service Provider Remote Work Holiday Outsourced IT Information Spam Training Compliance Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Apps Two-factor Authentication IT Support Mobile Office Data Security Vendor Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Chrome Budget Mobile Device Management Gmail Apple Networking App Applications Computing Information Technology Access Control Hacker Conferencing Office 365 Avoiding Downtime Tip of the week Marketing How To BDR WiFi HIPAA Operating System Healthcare Help Desk Virtual Private Network Risk Management Computers Health Analytics Office Tips Augmented Reality Website Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data Remote Monitoring Social End of Support Vulnerability Vendor Management Remote Workers Cybercrime Physical Security Monitoring Display Printer Customer Service Paperless Office Free Resource Windows 11 Project Management Infrastructure Windows 7 2FA Microsoft 365 Excel Telephone Document Management Solutions Cooperation Firewall Scam Data loss The Internet of Things Going Green Patch Management Save Money Virtual Machines Professional Services Settings User Tip Wireless Modem Printing Processor Content Filtering Mobile Security IT Management Meetings VPN YouTube Customer Relationship Management Cryptocurrency iPhone Smart Technology Computer Repair Hacking Vulnerabilities Saving Time Presentation Virtual Desktop LiFi Data storage Images 101 Managed IT Service Wireless Technology Supply Chain Multi-Factor Authentication Mobility Outlook Downloads Machine Learning Money Licensing Humor Word Entertainment Maintenance Employees Antivirus Integration Sports Mouse Telephone System Administration Cost Management Safety Holidays Data Privacy Data Storage Robot Video Conferencing Managed Services Provider Gig Economy Alt Codes Vendors Application Username Unified Threat Management Black Friday Internet Service Provider Teamwork Downtime Be Proactive Unified Threat Management Hosted Solution Workforce Evernote Database Regulations Compliance IBM IT Technicians Memes Typing Threats Proxy Server Cookies Network Congestion Cyber Monday Net Neutrality SQL Server Workplace Strategies User Error History Meta Knowledge Tactics Hotspot Financial Data Google Drive Mirgation Smartwatch IT Amazon Point of Sale 5G Nanotechnology Procurement Competition Azure Cyber security Unified Communications Outsource IT Tech Experience Addiction Language Telework Google Docs Chatbots CES Communitications Bitcoin Environment Network Management Running Cable Media Management Tech Support Screen Reader Monitors Distributed Denial of Service Supply Chain Management Google Wallet Small Businesses User Term Service Level Agreement Computing Infrastructure FinTech Identity IT Assessment Windows 8 Displays Laptop Websites Bookmark Smart Tech Flexibility Drones Value SharePoint Outsourcing Download Electronic Medical Records Alerts Organization IP Address Digital Security Cameras Smart Devices Halloween Browsers Connectivity Writing Break Fix Remote Working Lenovo Memory Workplace Data Breach Hiring/Firing Recovery Google Play Upload Virtual Reality Videos Multi-Factor Security Electronic Health Records Hacks Hard Drives Server Management Scary Stories Paperless Social Network Private Cloud Co-managed IT Identity Theft Fun IoT Dark Web Domains Superfish Wasting Time Trend Micro Deep Learning Technology Care Security Cameras Trends Twitter Regulations Google Calendar Software as a Service Refrigeration Business Communications Customer Resource management Error Education Scams Data Analysis Star Wars Social Engineering Microsoft Excel Public Speaking Managing Costs Lithium-ion battery eCommerce Hybrid Work SSID Gamification Remote Computing Staff Social Networking Legislation Surveillance Mobile Computing Virtual Assistant Human Resources Entrepreneur Cables Fileless Malware Tablet Search Virtual Machine Reviews Best Practice Medical IT Content Alert Wearable Technology Motherboard Dark Data Comparison Development Undo Managed IT Transportation Buisness Google Apps Health IT File Sharing Hypervisor IT solutions IT Maintenance Directions Assessment How To Permissions Legal Shopping Optimization Business Growth Business Intelligence PowerPoint Notifications Travel Specifications Employer/Employee Relationships Shortcuts Techology Ransmoware Microchip Google Maps Navigation Cortana Internet Exlporer Fraud PCI DSS

Blog Archive