Researcher Mordechai Guri at the University of the Negev, Israel, has accomplished the feat by converting a standard SATA cable into a radio transmitter, but without actually making any physical modifications to the hardware.
The point is that you can get soft access to the machine via malware and then use a second device to listen, jumping an air gap. No physical access required.
I get that the machine is air gapped. What was the range of the "antenna"? I'm thinking they better hurry up since most are moving to SSDs for storage. I would see most servers as not vulnerable to this attack either as most have short SAS cables and not the 10" SATA cable a desktop may have limiting range. Still pretty skeptical. I guess being an old fart makes me question almost everything.
[ + ] bobdole9
[ - ] bobdole9 0 points 1.8 yearsJul 21, 2022 13:04:52 ago (+0/-0)
[ + ] Sh1tt1ngMys3lf
[ - ] Sh1tt1ngMys3lf 0 points 1.8 yearsJul 21, 2022 12:27:22 ago (+0/-0)
[ + ] TheYiddler
[ - ] TheYiddler 0 points 1.8 yearsJul 21, 2022 14:32:44 ago (+0/-0)
[ + ] Sh1tt1ngMys3lf
[ - ] Sh1tt1ngMys3lf 0 points 1.8 yearsJul 22, 2022 06:51:25 ago (+0/-0)
[ + ] chrimony
[ - ] chrimony 0 points 1.8 yearsJul 22, 2022 09:54:23 ago (+0/-0)
It was 1m. This is a nothing burger.