"New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks"
Mordechai Guri of the Ben-Gurion University of the Negev in Israel introduces a new side-channel attack called "RAMBO," which is short for "Radiation of Air-gapped Memory Bus for Offense." It uses radio signals emanated by a device's Random Access Memory (RAM) to exfiltrate data. According to Dr. Guri, with Software-Generated Radio (SDR) signals, malware can encode biometric information, encryption keys, and other sensitive information. An attacker can intercept transmitted raw radio signals from a distance using SDR hardware and a commercially available antenna. The signals can then be decoded and translated back to binary data. This article continues to discuss the new RAMBO side-channel attack.
THN reports "New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks"
Submitted by grigby1