Are your wireless gadgets vulnerable to cyberattack?
Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities. They hack into a system so companies can fix vulnerabilities before someone unscrupulous can take advantage.
A variety of wireless mice and keyboards have a vulnerability that allows them to be hacked even at a distance. This opens up the machine they are plugged into for attack. After gaining access to a remote computer in this way, someone could install some pretty nasty malware.
The vulnerability was discovered by a researcher from Bastille named Mark Newlin.
Susceptible to Attack
The problem stems from the fact that the wireless protocol used to transmit the signal between the peripherals and their receiver, which is itself plugged into a computer, is unencrypted. This means that they are susceptible to attack, particularly from keystroke injection methods.
A remote computer — like a laptop — and a USB wireless dongle are all you need to carry out this attack.
The dongle can be modified to transmit the keystrokes to the remote machine, and since it only took Newlin between a few days and weeks to reverse-engineer the wireless protocols, it’s reasonable to assume the same for black hat hackers — the bad guys.
To gain access, the attacker spoofs the host computer’s keyboard and sends unencrypted packets of data to the dongle, which allow them to type commands. It’s like sitting in front of the keyboard at the host computer, except they can be hundreds of yards away.
In fact, the remote machine can be as far as 100 yards away, as long as there is a direct line-of-sight between it and the host computer. That distance can be increased tremendously if the hacker uses an auxiliary antenna. The attacks can even be carried out through walls and windows, as they rely on a wireless protocol.
All Beware the MouseJack
This type of attack is being called a MouseJack by the researchers who discovered it.
Products from brands like Amazon, Dell, HP, Gigabyte, Lenovo, Microsoft and Logitech have all been tested and found vulnerable. Worse yet, Bastille says there may be more peripherals from unnamed brands that are also affected but weren’t tested.
Some brands, like Logitech, have already issued a patch for the vulnerability, while others have promised to do so.
A Microsoft PR rep said, “Microsoft has a customer commitment to investigate reported security issues and will proactively update impacted devices as soon as possible.”
What Should I Watch Out for?
For this attack to work, the host machines have to be logged in, and users would have to be away. If they were at the computer, they would see the attacker’s keystrokes and know something was going on.
If you’re worried your computer might be vulnerable, the best thing to do is to log off your session anytime you’re going to be away from your computer. This goes for all machines, at home, work or elsewhere.
It’s unlikely a hacker could breach your system during your coffee break, but you’re better off safe than sorry.
Warning Signs of a Hack
It sounds silly, but if you notice keystrokes that you haven’t typed, your system has likely been breached. Another thing to watch out for when using your system is if your mouse hangs before making the correct selection. For example, if you’re moving the mouse to start a certain app and it pauses, jitters or the computer seems to hang for a few moments before it moves and chooses the appropriate selection, there’s a possibility you’ve been hacked.
It’s important to note the mouse hang-up can also happen due to a system overload, like when you’re running too many programs at once. Sadly, you can see it is difficult to discern when this type of attack has happened, at least until the remote hacker starts interacting with your computer.
That’s why your best bet is to log off anytime you know you’re going to be away from your keyboard. Furthermore, keep an eye out for important software and firmware updates if you use one of the aforementioned keyboard brands. These companies will eventually release an update that patches the vulnerability, hopefully sooner rather than later.
Recent Stories
Follow Us On
Get the latest tech stories and news in seconds!
Sign up for our newsletter below to receive updates about technology trends