The attack program takes control of the physical prongs on general-purpose input/output circuits and vibrates them at a frequency of the researchers' choosing, which can be audible or not. The vibrations can be picked up with an AM radio antenna a short distance away.
For decades, spy agencies and researchers have sought arcane ways of extracting information from keyboards and the like, successfully capturing light, heat and other emanations that allow the receivers to reconstruct content.
The new makeshift transmitting antenna, dubbed "Funtenna" by lead researcher Ang Cui of Red Balloon Security, adds another potential channel that likewise be would be hard to detect because no traffic logs would catch data leaving the premises.
Cui showed the system in action for a few reporters ahead of his talk Wednesday at the annual security conference Black Hat in Las Vegas. He said he would release "proof-of-concept" code after the talk, allowing other researchers and potentially malicious hackers to build on his work.
Hackers would need an antenna close to the targeted building to pick up the sound waves, Cui said, and they would need to find some way to get inside a targeted machine and convert the desired data to the format for transmission.
But the tool's development over the past two years is another illustration that a broadening array of devices can be manipulated in unpredictable ways and that attackers increase their advantage over defenders as gadgets grow more complex.
© Thomson Reuters 2015
For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.