Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Token Efficiency: Why Aria Networks Raised $125M for AI-Native Infrastructure

    April 18, 2026

    Virtual Safeguards: China Bans Addictive “Digital Humans” for Minors

    April 18, 2026

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    April 16, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      Token Efficiency: Why Aria Networks Raised $125M for AI-Native Infrastructure

      April 18, 2026

      Virtual Safeguards: China Bans Addictive “Digital Humans” for Minors

      April 18, 2026

      Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

      April 16, 2026

      The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

      April 15, 2026

      The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

      April 14, 2026
    • Crypto

      Quantum Computing Advances Force Coinbase and Institutional Custodians to Rethink Crypto Security

      March 8, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026
    • Gadgets & Smart Tech
      Featured

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      By preciousMarch 26, 2026
      Recent

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      March 26, 2026

      How ABB and Nvidia are Perfecting Industrial Robotics using AI Simulation

      March 20, 2026

      Neura Robotics Reaches €4B Valuation With Tether Backing

      March 12, 2026
    • Cybersecurity & Online Safety

      Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

      April 16, 2026

      Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

      April 6, 2026

      Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

      April 5, 2026

      Accenture and Anthropic Team Up on AI-powered Cybersecurity

      April 4, 2026

      Your BVN, Passport, and Bank Account May Already Be on the Dark Web. What Every Nigerian Must Do Right Now After the Banking Breaches

      April 4, 2026
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»SmartAttack: New Smartwatch Attack Shows How Air-gapped Systems Can Be Breached
    Cybersecurity & Online Safety

    SmartAttack: New Smartwatch Attack Shows How Air-gapped Systems Can Be Breached

    oluchiBy oluchiJune 24, 2025Updated:July 1, 2025No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Image Generated from Medium

    In a startling development that sounds straight out of a spy thriller, cybersecurity experts have unveiled a cutting-edge threat called “SmartAttack,” a novel cyberattack technique using smartwatches to breach air-gapped systems, typically considered impenetrable because they are physically isolated from any network.

    SmartAttack is a novel data exfiltration technique developed by Dr. Mordechai Guri of Ben-Gurion University of Negev, known for its strong cybersecurity research. It demonstrates a side-channel technique that uses the inertial measurement unit (IMU), specifically the accelerometer and gyroscope (both sensors) found in a smartwatch.

    What is SmartAttack?

    Air-gapped Systems

    To understand how SmartAttack works, we must first understand the concept of “air-gapped” systems. An air-gapped system is a security measure that involves isolating a computer or network and preventing it from establishing any external connection. 

    There is a complete physical or logical separation between the secured system and any unsecured network like the internet or other internal networks. Physical separation entails no connections to Ethernet cables, Wi-Fi, Bluetooth, or LAN. Logical separation involves the use of strong firewalls, strict access controls, and network segmentation.

    Air-gapped systems cannot be accessed remotely, which significantly reduces the risk of cyberattacks, malware infections, and data breaches that rely on network connectivity. Transfer of data is done manually and offline through the aid of carefully scanned removable media like USB drives, external hard drives, or magnetic tapes.

    Air-gapped systems are primarily used in government and military systems, nuclear facilities, industrial control systems, financial institutions, and sensitive research materials and to create backups for disaster recovery.

    How SmartAttack Works

    SmartAttack leverages electromagnetic (EM), optical, thermal, and acoustic (sound) channels for data exfiltration. A more effective method, however, according to Mordechai’s research, is via ultrasonic channels.

    The use of ultrasonic channels during data exfiltration is largely preferred due to its stealth and the availability of microphones and speakers present in almost all modern devices. This method requires a transmitter (PC or laptop with a speaker) and a receiver (a device with audio recording capabilities) to capture the signals.

    The transmitter gives off ultrasonic sound at 18 kHz and above that is inaudible to humans and can be encoded with sensitive data like keystrokes, encryption keys, credentials, or confidential documents to covertly transmit them to the receiver without suspicion.

    The first step involves a breach in the air-gapped system through an insider threat, supply chain attacks, or a corrupted removable media that introduces malware into the system. Once this is done, the exfiltrated data is converted into high-frequency ultrasonic signals, which are then transmitted through a receiver like the compromised PC speaker or smartwatch.

    A compromised smartwatch of a person with access to the secure environment serves as a silent data vacuum. With the aid of its built-in microphone, capable of picking up frequencies at 18-22 kHz, the encoded signals are captured, demodulated and decoded, and then sent through the smartwatch’s own Wi-Fi, Bluetooth, or cellular network system.

    Implications for High-Security Environments

    The research carried out by Mordechai on SmartAttack has highlighted a dangerous blind spot in critical infrastructure security. Air-gapped environments that seemed indestructible from wireless leaks and cyberattacks due to their offline nature no longer seem secure.

    Smartwatches have rapidly become a part of everyday wearables and never attract any suspicion, which makes them a dangerous medium for SmartAttack. This discovery begs for a rethink on policies that allow employees to bring their devices into sensitive areas.

    “The belief that an air-gapped computer is 100% secure is becoming obsolete,” said Dr. Mordechi Guri, lead researcher and head of the Cyber-Security Research Center at Ben-Gurion University. “Smartwatch sensors have become powerful enough to function as espionage tools, especially when worn by trusted insiders.”

    Accelerometer Hack Acoustic Side Channels Advanced Persistent Threats Air Gapped Systems Air-Gapped Systems Ben Gurion University Ben-Gurion University Covert Data Transmission Critical Infrastructure Security Cyber Espionage Tools Cyber Threat Detection cybersecurity Cybersecurity Blind Spots cybersecurity research Dr Mordechai Guri EM Side Channel Attack Gyroscope Exploit High Security Breach IMU Exploits Inertial Measurement Unit insider threats Next Gen Cyber Threats Novel Cyberattack Method Secure System Bypass SmartAttack SmartAttack Cyber Threat Smartwatch Data Leak Smartwatch Espionage Smartwatch security Smartwatch Sensors Risk Smartwatch Surveillance Spyware Techniques Ultrasonic Data Exfiltration Ultrasonic Hacking wearable exploits Wearable Tech Vulnerabilities
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    oluchi
    • X (Twitter)
    • LinkedIn

    I am a content writer with over three years of experience. I specialize in creating clear, engaging, and value-driven content across diverse niches, and I’m now focused on the tech and business space. My strong research skills, paired with a natural storytelling ability, enable me to break down complex topics into compelling, reader-friendly articles. As an avid reader and music lover, I bring creativity, insight, and a sharp eye for detail to every piece I write.

    Related Posts

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

    April 6, 2026

    Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

    April 5, 2026

    Comments are closed.

    Top Posts

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Anthropic Will Use Claude User Chats For Data Training

    October 16, 2025
    Don't Miss
    Artificial Intelligence & The Future

    Token Efficiency: Why Aria Networks Raised $125M for AI-Native Infrastructure

    By preciousApril 18, 2026

    Aria Networks, a Palo Alto-based networking startup founded in January 2025, has raised $125 million…

    Virtual Safeguards: China Bans Addictive “Digital Humans” for Minors

    April 18, 2026

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    April 16, 2026

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.