"Power Supply Can Turn Into Speaker for Data Exfiltration Over Air Gap"
Mordechai Guri, researcher at the Ben-Gurion University of the Negev, has demonstrated another method to steal data from an air-gapped system that involves the abuse of the power supply. The attack method, called POWER-SUPPLaY, is performed by infecting a device with malware to control its CPU workload. This control leads to the generation of both audible and inaudible sounds by the device's power supply, which can then be picked up by a nearby smartphone. Attackers can use this method to steal passwords, encryption keys, and files from machines that do not have any audio hardware. This article continues to discuss the demonstration of the POWER-SUPPLaY data exfiltration attack and other methods for stealing data from air-gapped devices.
Security Week reports "Power Supply Can Turn Into Speaker for Data Exfiltration Over Air Gap"