news

It has become possible to hack offline computers

For a long time, many computer and mobile device users believed that disconnecting from the internet was the best and most effective way to protect against hacking or data theft. Some influential individuals in certain countries even keep all their sensitive and important data on a computer that is not connected to the internet, under strict security. However, today we will share information with you that proves that these methods are no longer effective, and it is possible to hack computers that are not connected to the internet.



Even some governmental institutions, countries, or military devices rely on disconnected devices to store important data, with strict security measures in place. But with the daily advancements in technology and information security, hacking disconnected computers has become a common occurrence. Let’s start by discussing some details and methods that will be used to do so.

– Air Gapped Computers

Before discussing the methods, it is important to understand the term “air-gapped,” which refers to a computer or network that is completely isolated from the internet in any way, making it completely secure and inaccessible except by air. If a computer or network is referred to as an “Air Gapped computer,” it means that it is impossible to hack or access in any way. This is used by governments, governmental institutions, and banks. However, in the following paragraphs, it will be confirmed that it is now possible to hack these devices and undermine this concept.

Read also >> Famous hacking methods and how to protect yourself from them

– The First Method

This method was developed by the U.S. intelligence agency CIA. There have been leaks about the agency creating a tool called “Brutal Kangaroo” for hacking completely isolated computers that are not connected to the internet or any other computer devices. It also allows hacking closed networks without direct access, relying only on the Windows system. The usage of this tool involves infecting a USB device when used by someone connected to the internet within a company or organization, and when that USB is used to transfer files to those offline isolated computers, the malware starts working to create a network for data transfer privately, without the user noticing any error or issue.

These programs are used to execute commands and load programs without user intervention or approval. If a USB infected with this malware is used to transfer files to those offline and isolated devices, the malware starts working to create a network for data transfer, analyzing data and files, creating a network between the attacker and the isolated device without the user noticing any error.

Read also >> 6 steps to take in case of computer hacking

– The Second Method

In fact, this is not a single method but multiple methods that follow the same principle. It is based on communication between the disconnected computer and another computer or smartphone, where the disconnected device acts as a transmitter and the attacker’s device or phone acts as the data receiver. You may wonder how this data exchange occurs. It occurs through various methods like magnetic fields and control to exchange data, examples of which are MAGNETO and ODINI technology, or using power lines and electricity, or through ultrasonic waves used to hack smart assistants.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Content is protected !!