Categories: Breaking NewsHacking

BitWhisper – hacking Air-Gapped PCs through heat emissions

Israeli Researchers have defined a new exfiltration technique dubbed BitWhisper that is based on the heat emissions and built-in thermal sensors.

According researchers at the Ben Gurion University in Israel, by detecting the heat from one computer to an adjacent computer, is possible to establish a channel that can  claiming can facilitate the spread of keys, malicious code and more in general any kind of data.

This sort of bridge between the two computers was dubbed BitWhisper by the researchers  that demonstrated how to exploit it to transfer information between the two air-gapped systems. The channel relies on something so called “thermal pings,” a term used by the researchers to identify the repeated fusion of two networks via proximity and heat.

The BitWhisper attack is very complex, but it is very interesting because it doesn’t require any dedicated or modified hardware.

The researchers involved in the experiment are Researchers Mordechai Guri, Matan Munitz and the professor Yuval Elovici, the three experts plan to publish a paper, entitled “BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations,” describing the BitWhisper technique and findings of their experiment.

“At this stage, the attacker can communicate with the formerly isolated network, issuing commands and receiving responses,” states the report.

The researchers placed two computers at up to 15 inches from each other, they tried to transmit up to 8 bits of data per hour, an amount of information that could be enough to steal sensitive data like user’s credentials and secret keys, or to send commands to any agent listening on the target machine.

An Air-gapped network still represent a stringent security measure when it is necessary to isolate a system from the Internet to preserve it and the data it manages, typical applications are military networks and industrial control systems architectures.

Unfortunately a persistent attacker could by pass the security measure in different ways, by infecting a network with a USB key, like happened to the Stuxnet virus or the Fanny tool used by the Equation Group APT).

On October 2014, Israeli researchers demonstrated how to hack air gapped networks by using other techniques. One research relied on an all-in-one printer, complete with a built-in scanner, to infiltrate an air-gapped network, or a system, and steal sensitive data. The experts demonstrated that it is possible to compromise air-gapped networks controlling the malware with a long-distance laser which could be installed on a drone.

Early 2014, a group of researcher at Ben Gurion University demonstrated how to infect machines in air gapped networks through a cell phone and use the mobile device as an attack vector to hit the computer in the vicinity.

The BitWhisper bridge allows to establish a bidirectional communication channel between two computers by using the heat emitted by various internal components. The experts explained that in order to compromise the machine it is sufficient to infect the machine in the air-gappep network with a malware.

“BitWhisper provides a feasible covert channel, suitable for delivering command and control (C&C) messages, and leaking short chunks of sensitive data such as passwords,” continues the paper. 

In their experimental scenario, the researchers placed two computers parallel to each, one of the machines was connected to the Internet and the other was connected to the air-gapped network.

Hypothesizing that a malicious code was installed on both computers, on sender-end the heat generated by internal component workload (i.e. CPU, GPU) is transferred to the recipient which monitors the changes in temperature.

“BitWhisper establishes a covert channel by emitting heat from one PC to the other in a controlled manner. By regulating the heating patterns, binary data is modulated into thermal signals. In turn, the adjacent PC uses its built-in thermal sensors to measure the environmental changes. These changes are then sampled, processed, and demodulated into binary data,” explained the researchers.

Below the BitWhisper video proof of concept.

 

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  BitWhisper,   air-gapped network)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.