This devious attack turns a SATA cable into a data-stealing antenna

Data Breach
Image Credit: Shutterstock (Image credit: Shutterstock)

A newly discovered method of stealing files may have put every Mission: Impossible movie to shame.

Cybersecurity researcher Mordechai Guri, from the University of the Negev, Israel, has demonstrated how to steal sensitive files from a completely airgapped system (disconnected from all networks and devoid of all communications protocols such as Bluetooth) by turning the SATA cable into an antenna. 

Obviously, the method was dubbed SATAn, with Guri finding the SATA bus, when operational, generates electromagnetic interference which could be manipulated. In his experiments, he used the 6GHz frequency band and successfully transmitted sensitive data to a nearby laptop.

Not as easy as it sounds

There are two major caveats to this method. The first one is that in order to make the attack successful, the endpoint under attack needs to be compromised with malware, as a piece of code is necessary to actually turn the SATA cable into an antenna. 

The second is that the antenna is only capable of transferring data correctly at a distance of about one meter, meaning the victim needs to be super close to the attacker in order for the heist to work.

Still, we’ve seen airgapped systems infected with malware before (remember Stuxnet?), and knowing that these kinds of devices usually hold highly classified, super sensitive information, it wouldn’t be too crazy to see a state-sponsored actor try and use this method somewhere.

The SATA cable is used in pretty much every computer out there, as it’s the industry standard for connecting hard drives and SSDs with the motherboard. 

The best way to protect against these attacks is to prevent anyone from bringing any radio receivers into the facility. Still, this is crime we’re talking about, and if someone’s about to steal data, they’re bound to try and smuggle such devices into the premises. In that case, extra electromagnetic shielding on the SATA cable or to the PC's case, should be added.

Via: Tom's Hardware

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
3d rendering of a submarine power cable on the seabed
Subsea internet cables can now ‘listen’ for sabotage using irregular pulses of light
Satellite
NATO wants to build an alternative satellite-based internet to be used in case of emergency
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Apple users facing new security risks after critical USB component hacked
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)