{"id":34188,"date":"2023-06-27T08:30:05","date_gmt":"2023-06-27T07:30:05","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=34188"},"modified":"2024-09-04T20:13:37","modified_gmt":"2024-09-04T19:13:37","slug":"how-can-hackers-access-air-gapped-computers","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/how-can-hackers-access-air-gapped-computers\/34188\/","title":{"rendered":"How can hackers gain access to air-gapped computers?"},"content":{"rendered":"
Air-gapped computers are supposedly the safest type of cyber software around and were thought to be immune to data theft.<\/p>\n
Large businesses and government agencies typically store their most valuable and confidential information, such as files relating to research and development or intellectual property, on these types of servers.<\/p>\n
As a result, the organisation\u2019s most sensitive data is protected from direct cyber attacks and viruses that might spread through the rest of its IT system. Off-grid, the air-gapped server is hard for hackers to locate.<\/p>\n
According to CEO of Cystel<\/a> and cybersecurity expert Dr Meera Sarma, a criminal armed with a quantum computer, accessible via the cloud, would now be capable of hacking air-gapped computers through the organisation\u2019s electricity supply.<\/p>\n Long seen as the stuff of science fiction, quantum computers harness the power of quantum mechanics to solve complex problems far faster than a conventional computer.<\/p>\n Dr Sarma explained: \u201cElectronic devices all have distinct energy consumption patterns, and even an off-grid server will have a unique signature. This is usually a sound frequency that can be identified and measured using a quantum scanner.<\/p>\n \u201cIn order to find it, a cyber attacker would just need to perform a couple of quick scans, the first an IP scan to reveal the networked servers within a company, followed by a power consumption scan.<\/p>\n \u201cAny air-gapped server, which will be power-hungry, will then stick out like a sore thumb.\u201d<\/p>\n However, if the server is offline, then how can the hacker gain access?<\/p>\n \u201cThere are a limited number of server manufacturers, and each server produces a distinct noise signature.<\/p>\n \u201cThrough monitoring the power readings, a skilled hacker<\/a> will be able to work out the make and model of the air-gapped computer, which will help them build a picture of its update schedule,\u201d said Dr Sarma.<\/p>\n