Security footage caught his face for 0.8 seconds before he looked up at the camera. Then he calmly unplugged the dongle, walked out, and drove away.
Someone had installed a inside the switch's own voltage regulator circuit. It had no wireless radio, no outbound connection. It simply modulated the existing electrical noise of the switch's power supply. Any device sharing the same unshielded power circuit—a PLC, a camera, even a cheap phone charger—could demodulate that noise and exfiltrate packets bit by bit. xkw7 switch hack
Outside, the city's power grid hummed with a billion tiny conversations—light switches, chargers, appliances—each one a potential ear. Dina looked at her own desktop switch. Port 4's LED blinked. Friendly. Steady. Security footage caught his face for 0
She decapped the mystery IC under a microscope. Laser-etched on the die, barely visible: XK-SEC/7 . A custom chip. She cross-referenced supply chains—the XKW7 batch was from a contract manufacturer that had gone bankrupt six years ago. But six months before that bankruptcy, a shell company had ordered 5,000 modified voltage regulators. It had no wireless radio, no outbound connection
Dina decided not to pull the switch. Instead, she fed it a honeypot. She let the ghost MAC "see" a fake PLC reporting that the mill's safety interlocks were engaged. Then she waited.