"New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks"

Mordechai Guri of the Ben-Gurion University of the Negev in Israel introduces a new side-channel attack called "RAMBO," which is short for "Radiation of Air-gapped Memory Bus for Offense." It uses radio signals emanated by a device's Random Access Memory (RAM) to exfiltrate data. According to Dr. Guri, with Software-Generated Radio (SDR) signals, malware can encode biometric information, encryption keys, and other sensitive information. An attacker can intercept transmitted raw radio signals from a distance using SDR hardware and a commercially available antenna. The signals can then be decoded and translated back to binary data. This article continues to discuss the new RAMBO side-channel attack.  

THN reports "New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks"

Submitted by grigby1

Submitted by Gregory Rigby on