Motherboards still typically feature one for compatibility, and it turns out that such a speaker can be used for data exfiltration. This type of attack may serve as a last resort for a malicious actor when no other, simpler methods are feasible.ĭata exfiltration in this case uses the computer’s speaker: not some plug-in device, but a relic of the first personal computers - the internal speaker, also known as the “PC speaker”. Researchers at Korea University in Seoul have published a paper detailing a new method of data theft from a computer that has maximum protection that is - placed in an isolated room and surrounded with an air gap (i.e., connected to neither the internet nor a local network).
0 Comments
Leave a Reply. |