Story automatically generated by StoryBot Version 0.1.0a (Development).
Note: This is the complete story and will need further editing. It may also be covered by Copyright and thus should be acknowledged and quoted rather than printed in its entirety.
FeedSource: [TheRegister] collected from rss-bot logs
Time: 2016-07-26 16:04:17 UTC
Original URL: http://www.theregister.co.uk/2016/07/26/keysniffer_wireless_keyboard_vuln/ [theregister.co.uk]
Title: It's 2016 and your passwords can still be read off from wireless keyboards
Suggested Topics by Probability (Experimental) : 21.6 science 15.7 hardware 15.7 business 9.8 OS 7.8 mobile 7.8 digiliberty 5.9 security 5.9 code 2.0 techonomics 2.0 technomics 2.0 careersedu 2.0 careers 2.0 breaking
--- --- --- --- --- --- --- Entire Story Below --- --- --- --- --- --- ---
It's 2016 and your passwords can still be read off from wireless keyboards
Arthur T Knackerbracket has found the following story [theregister.co.uk]:
Millions of low-cost wireless keyboards are susceptible to a vulnerability that reveals private data to hackers in clear text.
The vulnerability – dubbed KeySniffer – creates a means for hackers to remotely “sniff” all the keystrokes of wireless keyboards from eight manufacturers from distances up to 100 metres away.
“When we purchase a wireless keyboard we reasonably expect that the manufacturer has designed and built security into the core of the product,” said Bastille Research Team member Marc Newlin, responsible for the KeySniffer discovery. “Unfortunately, we tested keyboards from 12 manufacturers and were disappointed to find that eight manufacturers (two thirds) were susceptible to the KeySniffer hack.”
The keyboard manufacturers affected by KeySniffer include: Hewlett-Packard, Toshiba, Kensington, Insignia, Radio Shack, Anker, General Electric, and EagleTec. Vulnerable keyboards are always transmitting, whether or not the user is typing. Consequently, a hacker can scan for vulnerable devices at any time. A complete list of affected devices can be found here [keysniffer.net].
Wireless keyboards have been the focus of security concerns before. In 2010, the KeyKeriki team exposed weak XOR encryption in certain Microsoft wireless keyboards. Last year Samy Kamkar’s KeySweeper exploited Microsoft’s vulnerabilities. Both of those took advantage of shortcomings in Microsoft’s encryption.
The KeySniffer discovery is different in that it reveals that manufacturers are actually producing and selling wireless keyboards with no encryption at all. Bluetooth keyboards and higher-end wireless keyboards from manufacturers including Logitech, Dell, and Lenovo are not susceptible to KeySniffer.
Bastille notified affected vendors to provide them the opportunity to address the KeySniffer vulnerability prior to going public on Tuesday. Most, if not all, existing keyboards impacted by KeySniffer cannot be upgraded and will need to be replaced, it warns.
Bastille’s discovery of KeySniffer follows month after its discovery of MouseJack [theregister.co.uk], a vulnerability affecting millions of wireless mice. ®