BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
BTC $65266.0064
ETH $3170.2759
BNB $579.9567
SOL $151.5810
stETH $3170.3792
XRP $0.5307
DOGE $0.1622
TON $6.2152
ADA $0.5047
AVAX $37.5087
wstETH $3690.1011
WBTC $65350.8728
DOT $7.1858
WETH $3168.2550
TRX $0.1112
BCH $512.3933
LINK $14.9136
MATIC $0.7262
ICP $15.2978
UNI $7.8248
LTC $85.1449
DAI $1.0008
RNDR $9.1190
CAKE $2.9399
IMX $2.1935
STX $2.8650
ETC $27.9082
FDUSD $0.9998
MNT $1.2003
NEAR $6.3271
FIL $6.6129
OKB $55.7832
HBAR $0.0909
TAO $475.1056
VET $0.0423
WIF $3.0785
ATOM $8.6865
MKR $3070.6157
KAS $0.1185
FET $2.4759
GRT $0.2860
INJ $29.1371
PEPE $0.0000
USDE $0.9998
XLM $0.1150
THETA $2.2569
XMR $121.6010
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Scientists have found a way to compromise isolated systems


    Information sent from an isolated computer to a distance of 2 m can be intercepted using a phone or laptop.

    The COVID-bit mechanism uses malware installed on a computer to generate electromagnetic radiation in the frequency range of 0-60 kHz, which is then picked up by an inconspicuous receiver located at a distance of 2 m. COVID-bit technology was developed this year and is designed to overcome air gaps (Air Gap) and collection of sensitive data.

    Air-gapped networks, despite their high level of isolation, can be compromised in a variety of ways, from a compromised USB drive to a supply chain attack. Because the isolated systems are not connected to the Internet, the attacker must develop a special method to deliver the stolen information.

    COVID-bit is a covert channel that is used by malware to transmit data using EM radiation from a switched mode power supply (SMPS) and frequency shift keying (FSK) to encode binary data. “By adjusting the CPU workload, you can control its power consumption and therefore control the instantaneous switching frequency of the SMPS component,” explains technology developer Dr. Guri.

    EMP can be picked up from a distance using $1 antennas that can be connected to the phone's 3.5mm audio jack to capture low frequency signals with a 1000bps bandwidth. The emissions are then demodulated to extract the data. At the same time, malicious code does not require elevated privileges and can be executed from a virtual machine.

    Data rate evaluation shows that keystrokes can be captured in near real time, and exfiltration of IP and MAC addresses takes between 0.1 and 16 seconds, depending on the data rate.

    To protect against such an attack, you must:

    conduct dynamic analysis of operation codes to identify threats;
    initiate random workloads on processors when anomalous activity is detected;

    monitor or jam signals in the range of 0-60 kHz.

    Author DeepWeb
    How you can make legal drugs?
    FBI concerned about Apple's implementation of encryption in iCloud

    Comments 0

    Add comment