ODINI Malware Bypasses Faraday Cages Using CPU Magnetic Emissions
Want more insights like this?
Researchers at Israel's Ben-Gurion University have developed ODINI, a proof-of-concept malware that extracts data from air-gapped computers even when protected by Faraday cages. The malware manipulates CPU workloads to generate low-frequency magnetic fields that penetrate metal shielding.
ODINI transmits stolen passwords, tokens, and encryption keys at 40 bits per second to receivers positioned 100-150 centimeters away. A variant called MAGNETO uses smartphone magnetometers as receivers, working at distances up to 12.5 centimeters at 5 bits per second.
Standard Faraday cages can't block these low-frequency transmissions. Defense options include expensive mu-metal shielding, magnetic field jammers, or strict policies banning electronic devices near sensitive systems.
Source: Cybersecurity News