<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

ODINI Malware Bypasses Faraday Cages Using CPU Magnetic Emissions

Discover how ODINI malware breaches air-gapped systems using magnetic fields, challenging standard defenses with innovative data extraction.
Content Team

Researchers at Israel's Ben-Gurion University have developed ODINI, a proof-of-concept malware that extracts data from air-gapped computers even when protected by Faraday cages. The malware manipulates CPU workloads to generate low-frequency magnetic fields that penetrate metal shielding.

ODINI transmits stolen passwords, tokens, and encryption keys at 40 bits per second to receivers positioned 100-150 centimeters away. A variant called MAGNETO uses smartphone magnetometers as receivers, working at distances up to 12.5 centimeters at 5 bits per second.

Standard Faraday cages can't block these low-frequency transmissions. Defense options include expensive mu-metal shielding, magnetic field jammers, or strict policies banning electronic devices near sensitive systems.

Source: Cybersecurity News

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo