{"id":190942,"date":"2025-06-17T06:10:18","date_gmt":"2025-06-17T06:10:18","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/190942\/"},"modified":"2025-06-17T06:10:18","modified_gmt":"2025-06-17T06:10:18","slug":"your-smartwatch-can-steal-highly-secure-data-heres-how","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/190942\/","title":{"rendered":"Your Smartwatch Can Steal Highly Secure Data \u2014 Here\u2019s How"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/06\/1750140618_711_960x0.jpg\" alt=\"A futuristic concept of advance communication technology depicting a holographic watches display searching the map for location in the city\" data-height=\"1761\" data-width=\"3132\" style=\"position:absolute;top:0\"\/><\/p>\n<p class=\"color-body light-text\" role=\"button\">SmartAttack shows how hackers can steal air-gapped data using a smartwatch.<\/p>\n<p>getty<\/p>\n<p>There are a myriad ways that a hacker can steal your data and compromise your systems, from automatic hacking machines, from <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/13\/microsoft-users-warned-of-ongoing-password-spraying-attack---act-now\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/13\/microsoft-users-warned-of-ongoing-password-spraying-attack---act-now\/\" target=\"_self\" aria-label=\"automatic hacking machines\" rel=\"noopener\">automatic hacking machines<\/a>, using your <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/03\/warning-issued-as-android-attack-turns-contacts-into-hackers\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/03\/warning-issued-as-android-attack-turns-contacts-into-hackers\/\" target=\"_self\" aria-label=\"contacts as unwitting accomplices\" rel=\"noopener\">contacts as unwitting accomplices<\/a>, and even analyzing <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/26\/change-your-pin-code-now-if-its-on-this-list\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/26\/change-your-pin-code-now-if-its-on-this-list\/\" target=\"_self\" aria-label=\"PIN code usage\" rel=\"noopener\">PIN code usage<\/a>, to name but three. But what if an attacker could steal highly confidential, top secret data from even an air-gapped network that is not connected to the internet, using a smartwatch? Security researchers at Ben-Gurion University of the Negev have demonstrated how they can do just that. Here\u2019s what you need to know about SmartAttack.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-1\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/11\/microsoft-issues-windows-10-and-11-update-as-attacks-already-underway\/\" target=\"_blank\" aria-label=\"Microsoft Issues Windows 10 And 11 Update As Attacks Already Underway\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/11\/microsoft-issues-windows-10-and-11-update-as-attacks-already-underway\/\">ForbesMicrosoft Issues Windows 10 And 11 Update As Attacks Already UnderwayBy Davey Winder<\/a><br \/>\nSmartAttack Can Exfiltrate Sensitive Data From Air-Gapped Networks Using A Smartwatch<\/p>\n<p>Let\u2019s get the prerequisite disclaimer out of the way first, shall we? This article is based on security research of the bleeding-edge variety. As such, it examines improbable scenarios that, if exploited, could have devastating consequences for governments and corporations alike. Just because something is unlikely to occur does not mean it will not or can not. Because the attack vector involved is that of air-gapped computers, the ones that contain the most highly sensitive of all data, hence the need to separate them from all external networks, that risk, however small, must never be discounted.<\/p>\n<p>Here\u2019s the truth of the matter: air-gapped systems can and have been compromised by everything from malicious insiders and contractors with infected USB thumb drives to highly sophisticated supply chain attacks involving state-sponsored campaigns, as observed in the past. This is important because it shows that this type of installation is not impenetrable. However, being able to attack such a system with malicious, system-harmful intent is quite different from eavesdropping, which, by necessity, requires the attacker to exfiltrate data from the environment. Because of the physical isolation from external systems, hackers will look to use other methods to exfiltrate data. Methods such as ultrasonic communication using smartphones as a covert communication channel. Hence, smartphones are not generally allowed within the vicinity of such air-gapped systems. But what if a smartwatch could be used instead?<\/p>\n<p>This is where Mordechai Guri, head of the Offensive Cyber Research Lab at the Ben-Gurion University of the Negev, Israel, steps in with his <a class=\"color-link\" href=\"https:\/\/arxiv.org\/html\/2506.08866v1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/arxiv.org\/html\/2506.08866v1\" aria-label=\"SmartAttack research\">SmartAttack research<\/a>.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-2\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/07\/fbi-issues-critical-cyberattack-alert---act-now-as-victims-skyrocket\/\" target=\"_blank\" aria-label=\"FBI Issues Critical Cyberattack Alert \u2014 Act Now As Victims Skyrocket\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/07\/fbi-issues-critical-cyberattack-alert---act-now-as-victims-skyrocket\/\">ForbesFBI Issues Critical Cyberattack Alert \u2014 Act Now As Victims SkyrocketBy Davey Winder<\/a><br \/>\nAir-Gap Jumping Using A Smartwatch<\/p>\n<p>This is where Mordechai Guri, head of the Offensive Cyber Research Lab at the Ben-Gurion University of the Negev, Israel, steps in with his <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/07\/fbi-issues-critical-cyberattack-alert---act-now-as-victims-skyrocket\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/07\/fbi-issues-critical-cyberattack-alert---act-now-as-victims-skyrocket\/\" target=\"_self\" aria-label=\"SmartAttack research\" rel=\"noopener\">SmartAttack research<\/a>. Guri is one of the leading authorities when it comes to what you might call, and he does, in fact, call <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/07\/fbi-issues-critical-cyberattack-alert---act-now-as-victims-skyrocket\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/07\/fbi-issues-critical-cyberattack-alert---act-now-as-victims-skyrocket\/\" target=\"_self\" aria-label=\"air-gap jumping research\" rel=\"noopener\">air-gap jumping research<\/a>. \u201cOur approach utilizes the built-in microphones of smartwatches to capture covert signals in real time within the ultrasonic frequency range of 18\u201322 kHz,\u201d Guri explained. The findings, Guri warned, \u201chighlight the security risks posed by smartwatches in high-security environments.\u201d<\/p>\n<p>I highly recommend reading the complete research for the full technical details regarding SmartAttack, but the TL;DR can be summed up as an already compromised system can have data successfully exfiltrated using a sound-monitoring app on a smartwatch that receives inaudible to human frequencies from malware installed on the target computer. It doesn\u2019t even have to be the hacker\u2019s smartwatch, as any compromised employee\u2019s watch could perform the same trick. \u201cThe smartwatch then forwards the extracted data to the attacker using available communication channels such as Wi-Fi, cellular networks, or Bluetooth tethering,\u201d Guri said, \u201ceffectively bypassing traditional security measures.\u201d<\/p>\n<p>Guri suggested that \u201crestricting or prohibiting the use of smartwatches and similar audio-capable wearables in sensitive environments is a direct mitigation strategy.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-3\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/21\/new-windows-server-2025-attack-compromises-any-active-directory-user\/\" target=\"_blank\" aria-label=\"Windows Server Attack Compromises Any Active Directory User\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/05\/21\/new-windows-server-2025-attack-compromises-any-active-directory-user\/\">ForbesWindows Server Attack Compromises Any Active Directory UserBy Davey Winder<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"SmartAttack shows how hackers can steal air-gapped data using a smartwatch. getty There are a myriad ways that&hellip;\n","protected":false},"author":2,"featured_media":190943,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3160],"tags":[78180,78185,78182,78184,1685,78183,78177,78178,78179,78181,51417,53,16,15],"class_list":{"0":"post-190942","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-gadgets","8":"tag-air-gapped","9":"tag-ben-gurion-university-of-the-negev","10":"tag-confidential-data-hack","11":"tag-eavesdropping","12":"tag-gadgets","13":"tag-security-research","14":"tag-smartattack","15":"tag-smartwatch-attack","16":"tag-smartwatch-hack","17":"tag-smartwatch-steals-sensitive-data","18":"tag-spying","19":"tag-technology","20":"tag-uk","21":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114697222522479707","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/190942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=190942"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/190942\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/190943"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=190942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=190942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=190942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}