Security footage caught his face for 0.8 seconds before he looked up at the camera. Then he calmly unplugged the dongle, walked out, and drove away.
Three hours later, a maintenance van with no logo parked outside the mill. A technician in a generic uniform walked in, clipboard in hand, and headed straight for the junction box. He didn't touch the switch. He plugged a small, unmarked dongle into a wall outlet—right into the same power circuit.
She cracked the casing open. Inside, a standard PCB, but with an unpopulated JTAG header and a single unmarked 8-pin IC. Not flash memory. Not the switching controller. Something else. She traced the circuit: the IC bridged the ground plane to the LED indicator for port 4. xkw7 switch hack
The dongle had no antenna. No network port. Just a microcontroller and a current sensor. It was the receiver.
Someone had installed a inside the switch's own voltage regulator circuit. It had no wireless radio, no outbound connection. It simply modulated the existing electrical noise of the switch's power supply. Any device sharing the same unshielded power circuit—a PLC, a camera, even a cheap phone charger—could demodulate that noise and exfiltrate packets bit by bit. Security footage caught his face for 0
"And the ghost MAC?"
She shrugged. "He got what he came for. But I made sure it was garbage data. For now." A technician in a generic uniform walked in,
Her stomach turned. The XKW7 wasn't just switching packets. It was bleeding them.
Outside, the city's power grid hummed with a billion tiny conversations—light switches, chargers, appliances—each one a potential ear. Dina looked at her own desktop switch. Port 4's LED blinked. Friendly. Steady.