Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 16 submissions in the queue.

Submission Preview

Link to Story

It's 2016 and Your Passwords Can Still be Read Off From Wireless Keyboards

Accepted submission by Arthur T Knackerbracket at 2016-07-26 18:43:51
Security

Story automatically generated by StoryBot Version 0.1.0a (Development).

Note: This is the complete story and will need further editing. It may also be covered by Copyright and thus should be acknowledged and quoted rather than printed in its entirety.

FeedSource: [TheRegister] collected from rss-bot logs

Time: 2016-07-26 16:04:17 UTC

Original URL: http://www.theregister.co.uk/2016/07/26/keysniffer_wireless_keyboard_vuln/ [theregister.co.uk]

Title: It's 2016 and your passwords can still be read off from wireless keyboards

Suggested Topics by Probability (Experimental) : 21.6 science 15.7 hardware 15.7 business 9.8 OS 7.8 mobile 7.8 digiliberty 5.9 security 5.9 code 2.0 techonomics 2.0 technomics 2.0 careersedu 2.0 careers 2.0 breaking

--- --- --- --- --- --- --- Entire Story Below --- --- --- --- --- --- ---

It's 2016 and your passwords can still be read off from wireless keyboards

Arthur T Knackerbracket has found the following story [theregister.co.uk]:

Millions of low-cost wireless keyboards are susceptible to a vulnerability that reveals private data to hackers in clear text.

The vulnerability – dubbed KeySniffer – creates a means for hackers to remotely “sniff” all the keystrokes of wireless keyboards from eight manufacturers from distances up to 100 metres away.

“When we purchase a wireless keyboard we reasonably expect that the manufacturer has designed and built security into the core of the product,” said Bastille Research Team member Marc Newlin, responsible for the KeySniffer discovery. “Unfortunately, we tested keyboards from 12 manufacturers and were disappointed to find that eight manufacturers (two thirds) were susceptible to the KeySniffer hack.”

The keyboard manufacturers affected by KeySniffer include: Hewlett-Packard, Toshiba, Kensington, Insignia, Radio Shack, Anker, General Electric, and EagleTec. Vulnerable keyboards are always transmitting, whether or not the user is typing. Consequently, a hacker can scan for vulnerable devices at any time. A complete list of affected devices can be found here [keysniffer.net].

Wireless keyboards have been the focus of security concerns before. In 2010, the KeyKeriki team exposed weak XOR encryption in certain Microsoft wireless keyboards. Last year Samy Kamkar’s KeySweeper exploited Microsoft’s vulnerabilities. Both of those took advantage of shortcomings in Microsoft’s encryption.

The KeySniffer discovery is different in that it reveals that manufacturers are actually producing and selling wireless keyboards with no encryption at all. Bluetooth keyboards and higher-end wireless keyboards from manufacturers including Logitech, Dell, and Lenovo are not susceptible to KeySniffer.

Bastille notified affected vendors to provide them the opportunity to address the KeySniffer vulnerability prior to going public on Tuesday. Most, if not all, existing keyboards impacted by KeySniffer cannot be upgraded and will need to be replaced, it warns.

Bastille’s discovery of KeySniffer follows month after its discovery of MouseJack [theregister.co.uk], a vulnerability affecting millions of wireless mice. ®


Original Submission