Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Can Now Use Radio Signals to Steal Corporate Data

b2ap3_thumbnail_radio_signal_hacker_400.jpgHackers are always coming up with new, unprecedented methods of hacking unsuspecting victims. Despite their best efforts, technology professionals have managed to keep up with threats, but this only forces threats to continue to innovate. In fact, some hackers are even capable of using radio signals to hack into an unconnected device and steal confidential corporate data.

Researchers in Israel have developed a technology that extracts information from a machine using radio frequencies and wireless communications. This might not sound intimidating at first, but what if we mention that these attacks can target isolated machines that have no connection to the Internet or your network at all? These types of disconnected devices are often in such high-security locations that employees aren’t even allowed to bring their mobile phones anywhere near the machine. Such powerful security measures should be enough to protect this data from just about anything--everything except radio signals.

The researchers in question have proven that these methods can be, and already have been, used to siphon data from disconnected devices. Cyber Security Labs at Ben Gurion University have dubbed this technique “AirHopper.” By using radio frequencies, the researchers succeeded in leaking information from isolated machines via their transceiver. This is one of the methods the NSA used to spy on foreign countries.

While the researchers haven’t explicitly stated that they use the same method as the NSA, it’s still very similar in nature. They created a malware that can be sent by a mobile phone’s FM transmitter; from there, in theory, it can infect other devices in range. Infected devices then proceed to generate more radio frequencies to infect other devices in range. According to WIRED magazine:

The data can be picked up by a mobile phone up to 23 feet away and then transmitted over Wi-Fi or a cellular network to an attacker’s command-and-control server. The victim’s own mobile phone can be used to receive and transmit the stolen data, or an attacker lurking outside an office or lab can use his own phone to pick up the transmission.

This kind of technique is, without a doubt, complex. Only the most skilled hackers have any hopes of pulling something like this off. However, it should be noted that it’s not as unlikely as any other advanced hacking attack from being exploited. The most likely way this kind of threat can attack a disconnected system is through a USB device or flash drive, which significantly limits the potential for attacks. Only those who have physical access to the machine would have any chance to infect it, even unknowingly, but this doesn’t mean you should let your guard down.

In fact, the importance of monitoring your IT infrastructure for discrepancies can’t be emphasized enough. Limiting who has access to mission-critical disconnected and connected technology is the first step toward protecting any information stored on it. Using secure USB devices is another necessary step which can prevent potential hacking attacks from occurring. Data leakage is a primary concern for all businesses, and your business could be held liable if sensitive information is stolen. In order to prevent these catastrophes, your business should be prepared to maximize security.

Voyage Technology’s remote monitoring solution is specifically designed so that we keep an eye out for suspicious activity. We’ll take the necessary precautions and neutralize threats before they cause irreparable damage. Give us a call at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 09 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Productivity Quick Tips Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade AI Business Management Data Recovery VoIP Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Tech Term Network Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Training Covid-19 Gadgets Cloud Computing Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Two-factor Authentication Mobile Office Vendor Data Security Apps Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing HIPAA Office 365 Applications WiFi How To Conferencing BDR Computing Hacker Information Technology Website Health Router Analytics Office Tips Augmented Reality Retail 2FA Storage Password Help Desk Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Computers Virtual Private Network Risk Management Printer Paperless Office Solutions Infrastructure Firewall Document Management Windows 11 Monitoring The Internet of Things Scam Excel Data loss Social Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Cooperation Free Resource Project Management Cybercrime Windows 7 Physical Security Display Microsoft 365 Computer Repair Virtual Desktop Data storage LiFi Employees Word Integration Outlook Machine Learning Modem User Tip Money Processor Mobile Security Humor Holidays Safety Maintenance Data Storage Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Administration Managed IT Service Downloads Robot iPhone Customer Relationship Management Licensing Settings Entertainment Wireless Vulnerabilities Printing Content Filtering Data Privacy Hacking IT Management Images 101 YouTube Meetings Presentation VPN Multi-Factor Authentication Mobility Cryptocurrency Telephone System Cost Management Wireless Technology IP Address Google Docs Unified Communications Content Remote Working Experience Wearable Technology Memory Vendors Running Cable Tech Support Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Network Management Health IT Google Wallet Directions Videos Assessment Electronic Health Records Monitors Permissions Workforce Recovery Wasting Time Threats Laptop Websites Trend Micro Specifications Security Cameras Workplace Strategies Hard Drives Windows 8 Domains Drones Microchip Internet Exlporer Software as a Service Fraud Meta SharePoint Username Electronic Medical Records Managing Costs Amazon Halloween eCommerce Black Friday SSID Refrigeration Public Speaking Lenovo Database Surveillance Writing Virtual Assistant Outsource IT Media Lithium-ion battery Virtual Reality IT Technicians Virtual Machine Environment Entrepreneur Scary Stories Private Cloud Cookies Cyber Monday Medical IT Hacks Server Management Proxy Server Reviews Superfish Identity Theft Tactics Development Fun Hotspot Transportation Small Businesses Deep Learning Twitter Mirgation Hypervisor Displays Error Nanotechnology Optimization PowerPoint Undo Shopping Education Addiction Social Engineering Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Remote Computing Chatbots Screen Reader Distributed Denial of Service Workplace Mobile Computing Gig Economy Tablet Service Level Agreement Internet Service Provider Search Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Application Best Practice Regulations Compliance Alert Identity Buisness File Sharing Smart Tech Memes Dark Data Co-managed IT Managed IT Bookmark IBM Legal IT solutions Download Net Neutrality How To Alerts SQL Server Technology Care Business Communications Business Growth Financial Data Notifications History Travel Connectivity IT Break Fix Scams Browsers Smartwatch Techology Google Maps Upload Procurement Cortana Azure Hybrid Work Multi-Factor Security Tech Human Resources Alt Codes Social Network Telework Cyber security CES Downtime Unified Threat Management IoT Communitications Dark Web Cables Competition Unified Threat Management Hosted Solution Trends Supply Chain Management Regulations Google Calendar Term Google Apps Typing Customer Resource management FinTech Data Analysis Star Wars IT Assessment Network Congestion Microsoft Excel IT Maintenance Google Drive User Error User Gamification Flexibility Knowledge Staff Value Business Intelligence Social Networking Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Point of Sale Smart Devices 5G Ransmoware

Blog Archive