Monday, April 14, 2025
HomeCyber Security NewsCOVID-bit - A New Secret Channel to Spy Data Over the Air...

COVID-bit – A New Secret Channel to Spy Data Over the Air from Air-gapped Systems

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a new covert channel to steal sensitive information from Air-gapped systems over the air from a distance of 2m.

The ‘air-gap’ computers are physically isolated from a network or device from external networks such as the Internet.

COVID-bit Airgap

The air-gapped computers are maintained in banking, stock exchange networks, critical infrastructure, life-critical systems, and medical equipment.

- Advertisement - Google News

COVID-bit Secret Channel to Exfiltrate Data

Researchers from Ben-Gurion University of the Negev, Israel, uncovered a new unique covert channel that let attackers leak data from air-gapped systems.

The attack method leverages the malware already planted on the isolated computer with the help of an insider or through other mediums.

In this attack model, the attacker must compromise the targeted system and infect or maintain electronic devices such as radio receivers, microphones, and optical cameras.

The malware on the air-gapped computer generates radio waves by executing crafted code on the target system and exploiting the power consumption of computers the malware is able to generate low-frequency electromagnetic radiation.

Notably, the attack is highly evasive since it executes from an ordinary user-level process, does not require root privileges, and is effective even within a Virtual Machine(VM).

By using the Radio signals sensitive information such as files, encryption keys, biometric data, and keylogging can be modulated and leaked.

Data Exfiltration

“Attack scenario (‘insider’): malware within the infected air-gapped computer (A) transmits the sensitive file via electromagnetic radiation. The file is received by a smartphone of a malicious insider/visitor standing behind the wall in a less secure area (B).”

The signals are observed using a smartphone or laptop with a small loop antenna from a distance of about 2m. Observed signals are decoded and delivered to the attacker via the Internet.

“It is important to note that the attack model compound of transmitters and receivers has been broadly discussed in the domain of covert channels for the last twenty years.”

“We showed that malware on air-gapped computers could generate electromagnetic radiation in specific low-frequency bands. The malicious code exploits modern computers’ dynamic power and voltage regulation and manipulates the loads on CPU cores.”

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...