{"image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/t/tanigawa/20250612/20250612075151.png","author_name":"tanigawa","height":"190","url":"https://malware-log.hatenablog.com/entry/2025/06/11/000000","version":"1.0","blog_title":"TT Malware Log","type":"rich","title":"SmartAttack uses smartwatches to steal data from air-gapped systems","author_url":"https://blog.hatena.ne.jp/tanigawa/","published":"2025-06-11 00:00:00","categories":["\u653b\u6483\u624b\u6cd5: SmartAttack"],"provider_url":"https://hatena.blog","description":"\u3010\u8a33\u3011SmartAttack\u306f\u30b9\u30de\u30fc\u30c8\u30a6\u30a9\u30c3\u30c1\u3092\u4f7f\u7528\u3057\u3066\u3001\u30a8\u30a2\u30ae\u30e3\u30c3\u30d7\u30b7\u30b9\u30c6\u30e0\u304b\u3089\u30c7\u30fc\u30bf\u3092\u76d7\u307f\u51fa\u3057\u307e\u3059 \u3010\u56f3\u8868\u3011 \u96a0\u853d\u30c1\u30e3\u30cd\u30eb\u3068\u30ad\u30fc\u30dc\u30fc\u30c9\u5165\u529b\u306b\u3088\u308b\u5e72\u6e09 (arxiv.org) \u9001\u4fe1\u6a5f\u306e\u7a2e\u985e\u5225\u6027\u80fd (\u51fa\u5178\uff1aarxiv.org) \u6027\u80fd\u6e2c\u5b9a\uff08\u4fe1\u53f7\u5bfe\u96d1\u97f3\u6bd4\u3001\u30d3\u30c3\u30c8\u30a8\u30e9\u30fc\u7387\uff09 (arxiv.org) \u51fa\u5178: https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/ \u3010\u8981\u7d04\u3011 \u300cSmartAttack\u300d\u306f\u3001\u30a8\u30a2\u30ae\u30e3\u30c3\u30d7\u74b0\u5883\u306b\u611f\u67d3\u3057\u305f\u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmalware-log.hatenablog.com%2Fentry%2F2025%2F06%2F11%2F000000\" title=\"SmartAttack uses smartwatches to steal data from air-gapped systems - TT Malware Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_name":"Hatena Blog","blog_url":"https://malware-log.hatenablog.com/","width":"100%"}