{"id":191114,"date":"2025-06-17T07:40:08","date_gmt":"2025-06-17T07:40:08","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/191114\/"},"modified":"2025-06-17T07:40:08","modified_gmt":"2025-06-17T07:40:08","slug":"hackers-could-use-smartwatches-to-eavesdrop-on-air-gapped-computers-via-ultrasonic-signals","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/191114\/","title":{"rendered":"Hackers could use smartwatches to eavesdrop on air-gapped computers via ultrasonic signals"},"content":{"rendered":"<p>            <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/06\/possibility-of-infiltr.jpg\" alt=\"Possibility of infiltrating air-gap computing systems using a smartwatch\" title=\"Illustration of the attack model. A programmer working in front of a highly secure or air-gapped computer wears a smartwatch on their wrist. The infected computer transmits sensitive data, such as keylogging information, modulated onto ultrasonic signals, which are covertly received by the smartwatch. Credit: arXiv (2025). DOI: 10.48550\/arxiv.2506.08866\" width=\"800\" height=\"530\"\/><\/p>\n<p>                Illustration of the attack model. A programmer working in front of a highly secure or air-gapped computer wears a smartwatch on their wrist. The infected computer transmits sensitive data, such as keylogging information, modulated onto ultrasonic signals, which are covertly received by the smartwatch. Credit: arXiv (2025). DOI: 10.48550\/arxiv.2506.08866<\/p>\n<p>A security specialist at Ben-Gurion University of the Negev has found evidence that it might be possible to infiltrate an air-gap computing system using a smartwatch. Mordechai Guri has published a <a href=\"https:\/\/arxiv.org\/abs\/2506.08866\" target=\"_blank\" rel=\"noopener\">paper<\/a> outlining his ideas on the arXiv preprint server.<\/p>\n<p>Air-gap computers or computing systems are those that have been physically removed from other networks, such as the internet, as a way to make them remotely hack-proof. The only way such a computer or system could be hacked would be to gain direct <a href=\"https:\/\/techxplore.com\/tags\/physical+access\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">physical access<\/a> or to have someone do it for them. In his paper, Guri suggests there may be another way\u2014by using features of smartwatches.<\/p>\n<p>Smartwatches, Guri notes, have all the features needed to listen for ultrasonic signals from an air-gapped computer, starting with a microphone. They also could be used for processing signals or for routing them to a speaker or a Wi-Fi device, which could broadcast them to a more sophisticated device.<\/p>\n<p>He notes that testing of such a hacking approach has already shown that data can be broadcast over ultrasonic frequencies over a distance of approximately 6 meters at data rates of up to 50 bps. Such a scenario would involve a <a href=\"https:\/\/techxplore.com\/tags\/hacker\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">hacker<\/a> gaining access to the computer and installing malware that would broadcast more easily decipherable information. Then, <a href=\"https:\/\/techxplore.com\/tags\/ultrasonic+signals\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">ultrasonic signals<\/a> from the air-gapped computer could be captured by a nearby person wearing a <a href=\"https:\/\/techxplore.com\/tags\/smartwatch\/\" rel=\"tag noopener\" class=\"textTag\" target=\"_blank\">smartwatch<\/a>.<\/p>\n<p>Such an approach might involve dormant malware that would only become active when a hacker is nearby. Uri even envisions a smartwatch being stolen from an employee, loaded with malware and then being clandestinely returned to the employee.<\/p>\n<p>Guri acknowledges that using a smartwatch to hack an air-gap system would prove extremely difficult\u2014a hacker would still have to gain proximity to a target computer or system. And they would have to do so without other people being aware of their presence\u2014though it could possibly be done by a plant or a spy. In any case, it is likely such an attempt would only be made on extremely high-value targets, which would likely have many layers of other types of physical protection.<\/p>\n<p><strong>More information:<\/strong><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tMordechai Guri, SmartAttack: Air-Gap Attack via Smartwatches, arXiv (2025). <a data-doi=\"1\" href=\"https:\/\/dx.doi.org\/10.48550\/arxiv.2506.08866\" target=\"_blank\" rel=\"noopener\">DOI: 10.48550\/arxiv.2506.08866<\/a><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t<strong>Journal information:<\/strong><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/techxplore.com\/journals\/arxiv\/\" target=\"_blank\" rel=\"noopener\">arXiv<\/a><br \/>\n                                                        <a class=\"icon_open\" href=\"http:\/\/arxiv.org\/\" target=\"_blank\" rel=\"nofollow noopener\"><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/p>\n<p class=\"article-main__note mt-4\">\n                                                \u00a9 2025 Science X Network\n                                            <\/p>\n<p>\n                                                <strong>Citation<\/strong>:<br \/>\n                                                Hackers could use smartwatches to eavesdrop on air-gapped computers via ultrasonic signals (2025, June 16)<br \/>\n                                                retrieved 17 June 2025<br \/>\n                                                from https:\/\/techxplore.com\/news\/2025-06-hackers-smartwatches-eavesdrop-air-gapped.html\n                                            <\/p>\n<p>\n                                            This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no<br \/>\n                                            part may be reproduced without the written permission. The content is provided for information purposes only.\n                                            <\/p>\n","protected":false},"excerpt":{"rendered":"Illustration of the attack model. A programmer working in front of a highly secure or air-gapped computer wears&hellip;\n","protected":false},"author":2,"featured_media":191115,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3160],"tags":[3295,1685,3292,3293,477,1302,3294,53,16,15],"class_list":{"0":"post-191114","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-gadgets","8":"tag-computer-news","9":"tag-gadgets","10":"tag-hi-tech-news","11":"tag-hitech","12":"tag-information-technology","13":"tag-innovation","14":"tag-inventions","15":"tag-technology","16":"tag-uk","17":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114697576642819725","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/191114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=191114"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/191114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/191115"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=191114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=191114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=191114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}