air-gapped network

LANtenna attack allows exfiltrating data from Air-Gapped systems via Ethernet cables

Boffins devised a new technique, dubbed LANtenna, to exfiltrate data from systems in air-gapped networks using Ethernet cables as a…

3 years ago

Cycldek APT targets Air-Gapped systems using the USBCulprit Tool

A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from…

4 years ago

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

Chinese threat actors, tracked as Tropic Trooper and KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines. Chinese…

4 years ago

New Ramsay malware allows exfiltrating files from air-gapped computers

Experts discovered a new strain of malware dubbed Ramsay that can infect air-gapped computers and steal sensitive data, including Word,…

4 years ago

USBsamurai for Dummies: How To Make a Malicious USB Implant & Bypass Air-Gapped Environments for 10$. The Dumb-Proof Guide.

The popular researcher Luca Bongiorni described how to make a malicious USB Implant (USBsamurai) that allows bypassing Air-Gapped environments with…

5 years ago

BeatCoin – Researchers demonstrate how to steal Cold Wallet Keys from Air-Gapped PCs

Israeli researchers presented their new research named BeatCoin, it is an experiment wherein they demonstrate how to steal private keys for…

6 years ago

Ops, hackers can exfiltrate data from air-gapped networks through a malware controlled via a scanner

A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled…

7 years ago

Researchers exfiltrate data by blinking the LEDs on the hard drives

A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware…

7 years ago

US Air Force Wireless hacking in Flight

The US Air Force is using a modified  EC-130 Compass Call aircraft to demonstrate how to hack into enemy networks.…

9 years ago

Just a basic low-end mobile phone needed to hack Air-Gapped computer

Security researchers from Israel proved that hacking most secure Air-gapped computers that typically are used in sensitive work environments, is…

9 years ago

This website uses cookies.