Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Can Now Use Radio Signals to Steal Corporate Data

b2ap3_thumbnail_radio_signal_hacker_400.jpgHackers are always coming up with new, unprecedented methods of hacking unsuspecting victims. Despite their best efforts, technology professionals have managed to keep up with threats, but this only forces threats to continue to innovate. In fact, some hackers are even capable of using radio signals to hack into an unconnected device and steal confidential corporate data.

Researchers in Israel have developed a technology that extracts information from a machine using radio frequencies and wireless communications. This might not sound intimidating at first, but what if we mention that these attacks can target isolated machines that have no connection to the Internet or your network at all? These types of disconnected devices are often in such high-security locations that employees aren’t even allowed to bring their mobile phones anywhere near the machine. Such powerful security measures should be enough to protect this data from just about anything--everything except radio signals.

The researchers in question have proven that these methods can be, and already have been, used to siphon data from disconnected devices. Cyber Security Labs at Ben Gurion University have dubbed this technique “AirHopper.” By using radio frequencies, the researchers succeeded in leaking information from isolated machines via their transceiver. This is one of the methods the NSA used to spy on foreign countries.

While the researchers haven’t explicitly stated that they use the same method as the NSA, it’s still very similar in nature. They created a malware that can be sent by a mobile phone’s FM transmitter; from there, in theory, it can infect other devices in range. Infected devices then proceed to generate more radio frequencies to infect other devices in range. According to WIRED magazine:

The data can be picked up by a mobile phone up to 23 feet away and then transmitted over Wi-Fi or a cellular network to an attacker’s command-and-control server. The victim’s own mobile phone can be used to receive and transmit the stolen data, or an attacker lurking outside an office or lab can use his own phone to pick up the transmission.

This kind of technique is, without a doubt, complex. Only the most skilled hackers have any hopes of pulling something like this off. However, it should be noted that it’s not as unlikely as any other advanced hacking attack from being exploited. The most likely way this kind of threat can attack a disconnected system is through a USB device or flash drive, which significantly limits the potential for attacks. Only those who have physical access to the machine would have any chance to infect it, even unknowingly, but this doesn’t mean you should let your guard down.

In fact, the importance of monitoring your IT infrastructure for discrepancies can’t be emphasized enough. Limiting who has access to mission-critical disconnected and connected technology is the first step toward protecting any information stored on it. Using secure USB devices is another necessary step which can prevent potential hacking attacks from occurring. Data leakage is a primary concern for all businesses, and your business could be held liable if sensitive information is stolen. In order to prevent these catastrophes, your business should be prepared to maximize security.

Voyage Technology’s remote monitoring solution is specifically designed so that we keep an eye out for suspicious activity. We’ll take the necessary precautions and neutralize threats before they cause irreparable damage. Give us a call at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Backup Passwords Communication Data Backup Saving Money Smartphone Managed Service Android VoIP Business Management Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Productivity Windows Microsoft Office Managed IT Services AI Current Events Remote Tech Term Network Internet of Things Artificial Intelligence Automation Facebook Covid-19 Cloud Computing Holiday Gadgets Information Server Remote Work Managed Service Provider Training Miscellaneous Outsourced IT Employee/Employer Relationship Encryption Compliance Spam Office Windows 10 Government Business Continuity Data Management IT Support Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Two-factor Authentication Vendor Mobile Office Apps Data Security BYOD Chrome Mobile Device Management Budget Gmail Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking Hacker HIPAA Avoiding Downtime Office 365 Applications Marketing Access Control Tip of the week Conferencing WiFi Computing How To BDR Information Technology Computers Router Analytics Website Office Tips Augmented Reality Virtual Private Network Storage Health Help Desk Password Bring Your Own Device Big Data Healthcare Retail Operating System Managed IT Services Risk Management Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Display Printer Windows 11 Monitoring Paperless Office 2FA Firewall Infrastructure Excel The Internet of Things Document Management Remote Workers Telephone Social Going Green Scam Data loss Cooperation Free Resource Project Management Cybercrime Windows 7 Customer Service Microsoft 365 Presentation Robot Virtual Desktop Data storage LiFi Wireless Technology Employees Integration IT Management Outlook VPN Meetings User Tip Modem Mobile Security Processor Money Humor Word Holidays Computer Repair Data Storage Smart Technology Supply Chain Sports Video Conferencing Mouse Managed Services Provider Saving Time Virtual Machines Safety Professional Services Administration Machine Learning Managed IT Service Downloads Maintenance iPhone Antivirus Licensing Settings Wireless Entertainment Printing Vulnerabilities Data Privacy Content Filtering Customer Relationship Management YouTube Images 101 Telephone System Multi-Factor Authentication Cryptocurrency Mobility Hacking Cost Management Content Remote Working Google Docs Wearable Technology Memory Vendors Unified Communications Travel Experience Health IT Techology Motherboard Data Breach Bitcoin Google Maps Comparison Google Play Be Proactive Running Cable User Permissions Workforce Directions Videos Assessment Electronic Health Records Google Wallet Wasting Time Threats Unified Threat Management Unified Threat Management Trend Micro Windows 8 IP Address Specifications Security Cameras Workplace Strategies Laptop Fraud Meta Microchip Internet Exlporer Software as a Service Drones Username Managing Costs Amazon Network Congestion User Error eCommerce Black Friday SSID Halloween Recovery Virtual Assistant Outsource IT Hard Drives Database Surveillance IT Technicians Virtual Machine Environment Domains Point of Sale Media Proxy Server Reviews Cookies Hacks Cyber Monday Medical IT Scary Stories Network Management Hotspot Transportation Small Businesses Refrigeration Tech Support Fun Tactics Development Mirgation Hypervisor Displays Deep Learning Public Speaking Monitors Shopping Nanotechnology Optimization Lithium-ion battery PowerPoint Language Employer/Employee Relationships Outsourcing Education Websites Entrepreneur Addiction Management PCI DSS Chatbots Navigation Electronic Medical Records Gig Economy SharePoint Screen Reader Mobile Computing Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Undo Search Service Level Agreement Internet Service Provider Regulations Compliance Lenovo Identity Best Practice Evernote Paperless Writing Virtual Reality Bookmark Smart Tech Memes Co-managed IT Buisness Legal Server Management Alerts SQL Server Technology Care IT solutions Private Cloud Download Net Neutrality Financial Data Superfish History Business Growth Identity Theft Business Communications Application Twitter Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Error Cortana Upload Procurement Social Network Telework Cyber security Alt Codes IBM Multi-Factor Security Tech Human Resources Social Engineering Downtime Remote Computing CES IoT Communitications Dark Web Cables Trends Supply Chain Management Hosted Solution Customer Resource management FinTech Regulations Typing Tablet Google Calendar Term Google Apps Microsoft Excel IT Maintenance Alert Data Analysis Star Wars IT Assessment Gamification Flexibility Google Drive Managed IT Staff Value Business Intelligence Competition File Sharing Knowledge Dark Data Organization Social Networking Legislation Shortcuts How To Ransmoware Notifications 5G Fileless Malware Digital Security Cameras Smart Devices

Blog Archive