New SmartAttack Exploits Smartwatches to Extract Data From Air-Gapped Systems

A sophisticated new attack method that exploits smartwatches to steal sensitive data from air-gapped computer systems, challenging long-held assumptions about the security of physically isolated networks.

The technique, dubbed “SmartAttack,” demonstrates how wearable devices can serve as covert communication receivers, capturing ultrasonic signals transmitted from compromised computers in high-security environments.

The SmartAttack method leverages the built-in microphones of smartwatches to capture covert signals transmitted through ultrasonic frequencies between 18-22 kHz, which remain inaudible to human ears.

The attack begins when malware infiltrates an air-gapped system through traditional methods such as infected USB drives or insider threats.

Once established, the malware gathers sensitive information including keystrokes, encryption keys, and confidential documents, then modulates this data onto ultrasonic sound waves transmitted through the computer’s speakers.

The compromised smartwatch continuously monitors the acoustic spectrum for these covert transmissions.

Upon detecting a signal, it demodulates and decodes the stolen data, then forwards the information to attackers through available communication channels such as Wi-Fi, cellular networks, or Bluetooth.

Signal-to-Noise Ratio (SNR) at increasing distances for three different transmitter configurations: active speaker, passive speaker, and laptop.

Signal-to-Noise Ratio (SNR) comparison
Signal-to-Noise Ratio (SNR) comparison

This creates an effective bridge between the isolated air-gapped network and external communication channels.

SmartAttack Exploits

Experimental validation reveals that SmartAttack can successfully transmit data over distances exceeding six meters, achieving transmission rates of up to 50 bits per second.

The effectiveness varies significantly based on the type of transmitter used, with active speakers maintaining the highest signal-to-noise ratio across all tested distances.

Research shows that lower transmission rates, such as 5 bits per second, provide greater reliability over extended distances, while higher rates suffer from rapid signal degradation.

The attack’s performance is notably influenced by smartwatch-specific factors including wrist movement, signal attenuation due to the human body, and directional constraints of built-in microphones.

Testing revealed that smartwatch orientation plays a crucial role in signal reception, with optimal positioning occurring when the device maintains a direct line-of-sight with the transmitting computer.

The wearable nature of these devices ensures proximity to potential signal sources, reducing the transmission distance required for successful data exfiltration.

The frequency intensity profiles in further illustrate how smartwatch orientation influences ultrasonic reception. The signal strength, denoted as I⁢(f,θ), varies as a function of both frequency f and orientation θ.

Frequency intensity profiles for different smartwatch orientations
Frequency intensity profiles for different smartwatch orientations

The strongest reception was observed in the 180-225 degree range relative to the transmitter.

Security Implications

The discovery highlights significant security vulnerabilities in environments previously considered highly secure.

According to Report, Unlike smartphones, smartwatches offer unique advantages for covert communication due to their constant presence on users’ wrists, making them less conspicuous and more likely to be present in sensitive environments.

Researchers propose several mitigation strategies to counter this emerging threat. These include restricting smartwatch usage in sensitive environments, deploying ultrasonic monitoring systems to detect unauthorized transmissions, and implementing ultrasonic jamming to disrupt covert communications.

More advanced solutions involve integrating ultrasonic firewalls within computer systems and employing audio-gapping techniques that physically remove or disable audio hardware components in highly secure environments.

The research underscores the evolving landscape of cybersecurity threats, where seemingly innocuous wearable devices can become sophisticated tools for data exfiltration, necessitating updated security protocols for air-gapped systems.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Mayura
Mayura
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here