A researcher at Ben Gurion University in Negev, Israel published a paper last Friday detailing a new technique of utilizing SATA communications to generate radio signals as a means of data exfiltration. This technique, dubbed SATAn, relies on other attacks to facilitate the initial compromise, as well as a second device to act as the receiver for the exfiltrated data.
The attack only requires read-write access to any device connected to the motherboard via SATA (hard disk drive, solid state drive, CD/DVD drive, etc.) and access to the data being exfiltrated. The malicious software then executes a series of reads and writes to generate a pattern of electromagnetic field that is interpreted as a radio signal on the 6GHz spectrum by a receiver as far as one meter away.