Researchers have unveiled a new attack method dubbed SmartAttack, which exploits smartwatches to extract data from physically isolated systems, such as government and military computers.
While these systems are fortified against network-based threats, they remain vulnerable to internal attacks, opening a new front in cybersecurity concerns.
The technique relies on malware that infects a device within the isolated environment. This malicious software extracts sensitive information and transmits it via ultrasonic signals, which can be captured by the microphones embedded in smartwatches worn by individuals nearby. O
nce intercepted, the smartwatches can relay the data through Wi-Fi, Bluetooth, or cellular networks to external parties.
The effectiveness of this attack varies based on the distance to the receiving device and the type of speaker used, with a maximum range of up to 9 meters and a data transfer speed ranging from 5 to 50 bits per second. This low-speed transmission, while limited, is sufficient to leak critical data over time, posing a significant risk to high-security settings.
Also read:
- Trump Family Unveils Trump Mobile Cellular Service and $499 T1 Smartphone
- Amazon and Roku Team Up to Amplify Advertising Reach
- People Crave Original Stories, But Franchises Still Rule the Box Office
To mitigate such threats, experts recommend banning smartwatches in protected environments and removing speakers from isolated computers. As wearable technology becomes increasingly ubiquitous, this discovery underscores the need for enhanced security protocols to safeguard even the most isolated systems from innovative exploitation methods.