Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
JDownloader Hacked to Infect Users with New Python RAT
May 11, 2026
Top 10 Best Interactive Malware Analysis Tools for
May 11, 2026
10 Best Full Disk Encryption Tools in 2026
May 11, 2026
Home/CyberSecurity News/ODINI Malware Breaches Air-Gapped Exploits Magnetic
CyberSecurity News

ODINI Malware Breaches Air-Gapped Exploits Magnetic

Capable of breaching air-gapped computers secured by Faraday cages, ODINI is a sophisticated proof-of-concept malware designed to extract sensitive information. By modulating the targeted computer’s...

David kimber
David kimber
May 11, 2026 3 Min Read
2 0

Capable of breaching air-gapped computers secured by Faraday cages, ODINI is a sophisticated proof-of-concept malware designed to extract sensitive information.

By modulating the targeted computer’s CPU workload to generate low-frequency magnetic fields, this covert channel successfully transmits data through advanced physical isolation barriers.

Developed by a team led by Mordechai Guri at Israel’s Ben-Gurion University, the ODINI research highlights severe vulnerabilities in environments traditionally deemed impenetrable.

Organizations in the military, financial, and critical infrastructure sectors heavily rely on air-gapped systems and Faraday cages to shield sensitive data from electromagnetic interference and remote network intrusions.

Despite these robust precautions, ODINI demonstrates that motivated threat actors who initially infect a system via supply-chain attacks or compromised USB drives can still retrieve high-value assets, such as passwords, authentication tokens, and encryption keys.

ODINI Malware on Air-Gapped Networks

The core exfiltration mechanism of ODINI relies entirely on the precise manipulation of the compromised machine’s central processing unit.

The malware intentionally overloads the CPU cores with calculations, causing dynamic fluctuations in power consumption that inherently generate low-frequency magnetic fields.

Because low-frequency magnetic waves have extremely low impedance, they easily penetrate standard computer chassis components and the solid metal shielding of Faraday cages.

The transmitting code requires no elevated administrative privileges to execute its tasks and utilizes simple processor operations to evade detection by conventional antivirus software or runtime monitoring tools.

Furthermore, the malware uses advanced data modulation schemes, including amplitude-shift keying and frequency-shift keying, to encode the stolen information onto the magnetic waves accurately, Mordechai Guri said.

Once the data is encoded and broadcast as a magnetic signal, an attacker must position a receiving device nearby to capture the covert emanations.

The ODINI technique utilizes a dedicated magnetic sensor located within a physical range of 100 to 150 centimeters from the compromised machine, achieving a maximum data transfer rate of 40 bits per second.

A parallel attack variant, named MAGNETO, exploits the identical CPU manipulation technique but uses an infected smartphone’s built-in magnetometer as the receiver.

MAGNETO is effective at distances up to 12.5 centimeters and transfers data at 5 bits per second, notably functioning even if the receiving smartphone is placed inside a Faraday bag or switched to airplane mode.

Defending against magnetic field exfiltration poses a substantial engineering challenge for security operations centers.

Conventional Faraday cages cannot block these low-frequency transmissions, and constructing physical shields from specialized ferromagnetic materials like mu-metal is often prohibitively expensive and highly impractical.

Security professionals recommend implementing hardware-based signal jamming, which utilizes commercial magnetic field generators to actively produce counter-magnetic noise that completely drowns out the covert transmissions.

Alternatively, software-based jamming can be deployed to introduce random CPU workloads that disrupt the attacker’s encoded signal, though this defensive approach may temporarily degrade overall system performance.

Ultimately, strict physical zoning policies that completely ban external electronic devices from the immediate vicinity of air-gapped computers remain the most reliable defensive measure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

New cPanel & WHM Flaws Allow Code Execution Enable Attacks

Next Post

10 Best Full Disk Encryption Tools in 2026

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us