Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Latest Internet News»Widespread wireless mouse, keyboard flaw lets hackers use your PC from afar
Latest Internet News

Widespread wireless mouse, keyboard flaw lets hackers use your PC from afar

DeepBy DeepMarch 5, 2016No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

022316 mousejack

Countless wireless mice and keyboards can be hacked from 100 yards away leaving their host machines and the networks they are attached to open to malware, Bastille has discovered.

The problem, which is being called MouseJack, affects Amazon, Dell, Gigabyte, HP,Lenovo, Logitech and Microsoft products, the company says, and likely more vendors’ gear that they haven’t tested. Logitech alone shipped its billionth mouse in 2008, so the problem is widespread.

Some of the companies are issuing patches and workarounds or promising to. Others didn’t respond to requests sent last week for comment.

CERT-CC at Carnegie Mellon University issued an advisory about the vulnerability today.

The weakness lies in the protocols used between the devices and the USB wireless receivers attached to host computers, says Mark Newlin, the Bastille researcher who discovered the problem. They are unencrypted, leaving the devices susceptible to keystroke injection attacks.

That can be done from a remote computer equipped with an off-the-shelf USB wireless dongle sending keystrokes, he says. He says it took between days and weeks to reverse-engineer the protocols himself so he could send the keystrokes.

The remote machine can be 100 yards away as long as it has direct line-of-sight with thetarget. That distance could be increased considerably by adding an auxiliary antenna, he says. Users of the machines would have to be away from them and logged in for the attack to work. If they were there they’d see the attack strokes being entered.

He says he carried out successful MouseJack attacks with the victim machine separated from the attacking machine by walls and windows.

Attackers could write scripts that fire off malware to be uploaded to the target that allows any number of further attacks, Newlin says, or to access resources the user’s login authorizes.

These devices use chips made by Nordic Semiconductor, some that support encryption and some that don’t. Newlin says those that do can be patched to implement the encryption. The others would have to be removed from the host machine when thekeyboard and mouse are not in use and the machine is turned on and unattended.

In response to an email about the vulnerability Microsoft sent this statement via its PR firm: “Microsoft has a customer commitment to investigate reported security issues, and will proactively update impacted devices as soon as possible.”

Logitech called the vulnerability “a difficult and unlikely path of attack,” but also issued a patch for it. “To our knowledge, we have never been contacted by any consumer with such an issue,” says Asif Ahsan, senior director of engineering for the company.

A spokesperson for Dell says in an email that Dell Technical Support will work with customers to see whether they own affected products, which are KM632 and KM714 mouse/keyboard packages. There’s a patch for KM714. The other package supports DellUniversal Pairing that can associate the USB wireless receiver with a specific mouse andkeyboard.

Dell notes that if customers use a password on their login screens and don’t walk away from their computers while logged in, the attack won’t work unless the attacker can break the password.

The other vendors had not responded by this morning to requests last week for comment.

Bastille makes radio-frequency sensors that scan traffic from 50MHz to 6GHz to identify devices that are within a corporation’s “airspace” so security pros can be on alert for any attacks they might initiate. The company’s founder and CEO Chris Rouland says an employee’s phone, for example, could be infected with malware that could potentially damage the corporate network. For example, it could seek out Bluetooth connections to networked devices and attempt to connect to the network that way to carry out theft or to damage the network itself.

[“source -cncb”]

afar flaw from hackers keyboard lets mouse PC use Widespread wireless Your
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Deep

Related Posts

4 Tips to Improve Data Loss Prevention (DLP) in Healthcare

April 16, 2025

Choosing the Right Belly Band Holster for Your Body Type

October 1, 2024

How to start a business ledger for new companies in India?

September 24, 2024
Recent Post
  • How to Grow Your Brand with Micro Influencer Marketing
  • What Are the 8 Different Types of Video Game Articles?
  • Strategies for Greater Financial Flexibility: 5 Smart Ways to Repay Your Home Loan Faster
  • PS5 Pro vs the PS5 – What’s the difference, really?
  • 4 Tips to Improve Data Loss Prevention (DLP) in Healthcare
  • A+ methods: Help students get ready for state exams
  • Again, winter greetings
  • Living games are here: How gen AI is leveling up the games industry
Search
  • Home
  • Privacy Policy
  • Contact Us !
© 2025 BlogSpotTips. Designed by BlogSpotTips.

Type above and press Enter to search. Press Esc to cancel.