Jump to content
Ban Hammer

Attackers Can Remotely Hack Wireless Keyboards, Mice

 Share

24 posts in this topic

Recommended Posts

Filed: Citizen (apr) Country: Brazil
Timeline

Posted: Feb. 25th, 2016

Researchers discovered that billions of wireless keyboards and mice are vulnerable to hacks through a $15 piece of equipment.

The remote cyberattack against wireless keyboards and mice, so-called MouseJack by the researchers, could lead to complete computer takeovers, according to reports. The hackers would reportedly need a $15 piece of equipment or dongle and 15 lines of Python code to remotely hack these devices from up to 590 feet away.

The researchers claim these devices are vulnerable to “remote exploitation via radio frequencies” through problems in the protocols or communications between the wireless devices and USB wireless dongles. The communications are unencrypted leaving the devices vulnerable to interception or hijacking by malicious actors, according to reports. The hackers may reportedly perform a keystroke injection to spoof a mouse, spoof a keyboard or conduct a forced pairing.

The researchers say attackers could use the $15 dongle to pair and take over the victim’s dongle to act as a mouse, utilizing that take over to access the keyboard and obtain control over the victim’s computer or network. The entire hijacking process can happen within seconds, according to the researchers.

“Don’t think of an attacker needing to use your keyboard/ mouse for minutes looking through your interesting emails. In around ten seconds, your computer can be altered to allow an attacker to remotely download documents, all your emails, and add or delete programs,” one researcher wrote in a post.

Since the vulnerability and attack method are at the keyboard level, the researchers claim that all computers, including Macs, Linux and other wireless dongles could be targeted by MouseJack. “We can compromise an airgapped network, going in through a different frequency protocol, directly to the USB port,” the researcher said in a post.

The manufacturers for these devices have been notified of the existing vulnerability; however, many of the mice are not able to be patched or updated, according to reports. The researchers warn that the method of attack could have serious implications, and could be used by nation-state hacking collectives to launch themselves into a network.

http://www.batblue.com/attackers-can-remotely-hack-wireless-keyboards-mice/

* ~ * Charles * ~ *
 

I carry a gun because a cop is too heavy.

 

USE THE REPORT BUTTON INSTEAD OF MESSAGING A MODERATOR!

Link to comment
Share on other sites

great now i have to resist the urge to shout out "TAKE OVER THE VICTIMS DONGLE" all day. thanks charles.

Link to comment
Share on other sites

Filed: IR-1/CR-1 Visa Country: China
Timeline

all my gear is wired.

Sometimes my language usage seems confusing - please feel free to 'read it twice', just in case !
Ya know, you can find the answer to your question with the advanced search tool, when using a PC? Ditch the handphone, come back later on a PC, and try again.

-=-=-=-=-=R E A D ! ! !=-=-=-=-=-

Whoa Nelly ! Want NVC Info? see http://www.visajourney.com/wiki/index.php/NVC_Process

Congratulations on your approval ! We All Applaud your accomplishment with Most Wonderful Kissies !

 

Link to comment
Share on other sites

Filed: Citizen (apr) Country: Brazil
Timeline

great now i have to resist the urge to shout out "TAKE OVER THE VICTIMS DONGLE" all day. thanks charles.

isn't that the battle cry of all caba women?

* ~ * Charles * ~ *
 

I carry a gun because a cop is too heavy.

 

USE THE REPORT BUTTON INSTEAD OF MESSAGING A MODERATOR!

Link to comment
Share on other sites

Filed: AOS (apr) Country: Philippines
Timeline

Scary

Sent I-129 Application to VSC 2/1/12
NOA1 2/8/12
RFE 8/2/12
RFE reply 8/3/12
NOA2 8/16/12
NVC received 8/27/12
NVC left 8/29/12
Manila Embassy received 9/5/12
Visa appointment & approval 9/7/12
Arrived in US 10/5/2012
Married 11/24/2012
AOS application sent 12/19/12

AOS approved 8/24/13

Link to comment
Share on other sites

Filed: Citizen (apr) Country: Ecuador
Timeline

Since the vulnerability and attack method are at the keyboard level, the researchers claim that all computers, including Macs, Linux and other wireless dongles could be targeted

Therefore, all users of VJ should immediately abandon using PCs and instead use handphones (right, Bro D?). :)

06-04-2007 = TSC stamps postal return-receipt for I-129f.

06-11-2007 = NOA1 date (unknown to me).

07-20-2007 = Phoned Immigration Officer; got WAC#; where's NOA1?

09-25-2007 = Touch (first-ever).

09-28-2007 = NOA1, 23 days after their 45-day promise to send it (grrrr).

10-20 & 11-14-2007 = Phoned ImmOffs; "still pending."

12-11-2007 = 180 days; file is "between workstations, may be early Jan."; touches 12/11 & 12/12.

12-18-2007 = Call; file is with Division 9 ofcr. (bckgrnd check); e-prompt to shake it; touch.

12-19-2007 = NOA2 by e-mail & web, dated 12-18-07 (187 days; 201 per VJ); in mail 12/24/07.

01-09-2008 = File from USCIS to NVC, 1-4-08; NVC creates file, 1/15/08; to consulate 1/16/08.

01-23-2008 = Consulate gets file; outdated Packet 4 mailed to fiancee 1/27/08; rec'd 3/3/08.

04-29-2008 = Fiancee's 4-min. consular interview, 8:30 a.m.; much evidence brought but not allowed to be presented (consul: "More proof! Second interview! Bring your fiance!").

05-05-2008 = Infuriating $12 call to non-English-speaking consulate appointment-setter.

05-06-2008 = Better $12 call to English-speaker; "joint" interview date 6/30/08 (my selection).

06-30-2008 = Stokes Interrogations w/Ecuadorian (not USC); "wait 2 weeks; we'll mail her."

07-2008 = Daily calls to DOS: "currently processing"; 8/05 = Phoned consulate, got Section Chief; wrote him.

08-07-08 = E-mail from consulate, promising to issue visa "as soon as we get her passport" (on 8/12, per DHL).

08-27-08 = Phoned consulate (they "couldn't find" our file); visa DHL'd 8/28; in hand 9/1; through POE on 10/9 with NO hassles(!).

Link to comment
Share on other sites

Filed: Citizen (apr) Country: Brazil
Timeline

Therefore, all users of VJ should immediately abandon using PCs and instead use handphones (right, Bro D?). :)

or just use keyboards and mice with cords :)

* ~ * Charles * ~ *
 

I carry a gun because a cop is too heavy.

 

USE THE REPORT BUTTON INSTEAD OF MESSAGING A MODERATOR!

Link to comment
Share on other sites

Filed: Other Country: Russia
Timeline

The manufacturers for these devices have been notified of the existing vulnerability; however, many of the mice are not able to be patched or updated, according to reports. The researchers warn that the method of attack could have serious implications, and could be used by nation-state hacking collectives to launch themselves into a network.

http://www.batblue.com/attackers-can-remotely-hack-wireless-keyboards-mice/

Logitech released a firmware fix for their unifying receiver.

http://forums.logitech.com/t5/Mice-and-Pointing-Devices/Logitech-Response-to-Unifying-Receiver-Research-Findings/m-p/1493878/thread-id/73186

I'm curious how they could get this to work from 500' away though. I can't even get the actual mouse to work when I get more than 3 feet away from the receiver.

QCjgyJZ.jpg

Link to comment
Share on other sites

Logitech released a firmware fix for their unifying receiver.

http://forums.logitech.com/t5/Mice-and-Pointing-Devices/Logitech-Response-to-Unifying-Receiver-Research-Findings/m-p/1493878/thread-id/73186

I'm curious how they could get this to work from 500' away though. I can't even get the actual mouse to work when I get more than 3 feet away from the receiver.

That's cause your dongle is too small.

Link to comment
Share on other sites

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
- Back to Top -

Important Disclaimer: Please read carefully the Visajourney.com Terms of Service. If you do not agree to the Terms of Service you should not access or view any page (including this page) on VisaJourney.com. Answers and comments provided on Visajourney.com Forums are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Visajourney.com does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. VisaJourney.com does not condone immigration fraud in any way, shape or manner. VisaJourney.com recommends that if any member or user knows directly of someone involved in fraudulent or illegal activity, that they report such activity directly to the Department of Homeland Security, Immigration and Customs Enforcement. You can contact ICE via email at Immigration.Reply@dhs.gov or you can telephone ICE at 1-866-347-2423. All reported threads/posts containing reference to immigration fraud or illegal activities will be removed from this board. If you feel that you have found inappropriate content, please let us know by contacting us here with a url link to that content. Thank you.
×
×
  • Create New...