January 22, 2025

newslet-au.com

Breaking news and feature stories.

A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines

A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines

Security researchers have discovered that a mysterious hacking group has developed two new...


A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines

Security researchers have discovered that a mysterious hacking group has developed two new tools that can steal data from air-gapped machines. Air-gapped machines are isolated from the internet and other networks, making them extremely secure but not immune to attacks.

The first tool is called “GAPWALK,” which allows the attackers to exfiltrate data from air-gapped machines using radio frequencies. This means that even a computer that is not connected to any networks can still be compromised and have its data stolen.

The second tool is called “KNOCKKNOK,” which uses acoustic signals to transmit data from the air-gapped machine to a nearby device that is connected to the internet. This enables the hackers to bypass the physical isolation of the air-gapped machine and steal sensitive information.

These new tools pose a significant threat to organizations that rely on air-gapped machines to protect their most valuable data. It is crucial for organizations to be aware of these vulnerabilities and take steps to secure their systems against such sophisticated attacks.

Security experts recommend implementing additional security measures such as using Faraday cages or acoustic insulators to protect air-gapped machines from these kinds of attacks. Regular security audits and penetration testing can also help identify and mitigate potential vulnerabilities before they can be exploited by hackers.

In conclusion, the discovery of these new tools highlights the evolving threat landscape that organizations face in the digital age. It is important for organizations to stay vigilant and proactive in protecting their data and systems from advanced cyber threats.