Find a Question:
Many RF dongles mice and keyboards open to abuse
It seems simple RF dongles for wireless keyboards and mice to deceive: an attacker can make them accept keystrokes and so malware smuggling system. The many manufacturers dongles are vulnerable.
The attack can be performed with a USB dongle $ 15 and works up to a distance of 100 meters, found Bastille Networks, describing the vulnerability and his Mouse Jack mentioned. Dongles importing equipment include Logitech, Dell, HP, Lenovo and Microsoft are vulnerable. Logitech is about the Unifying Receiver combined with the K360, K400r, K750 and K830. Logitech has a software update released to fix the problem.
That problem lies in the fact that the RF packets of wireless keyboards indeed encrypted, but not for clicks and movements. Since there is no authentication method, a dongle can therefore not distinguish between clicks from the user and that of the attacker. Bastille has now found a bug in the way in which the dongles process the received packets. Through the vulnerability it is possible ‘mouse packets’ so adaptable that they generate keystrokes. The host dongle of a target accepts the packets and the attacker so in this way code as malware retrieving and executing the system to take over for example the system.
Crazy Radio PA Security researchers used the Crazy Radio PA , an RF dongle with a nRF24L-transceiver and antenna for operation at long range. The firmware of this proved easy to customize with a few lines of Python code injection packetsniffing- and functionality. Via fuzzing packets to and from dongles could be analyzed.
Most appeared mouse susceptible to spoofing and thus injection of keystrokes, but some dongles also appeared to accept unencrypted packets keyboard. In addition revealed the short-term pairing mode which some dongles offer sometimes be circumvented, then an attacker can pair its key without further user interaction.
In about half of the tested components is updating the accessories to remedy the vulnerability impossible, Bastille claims. Users are advised to use no more dongles and switching to Bluetooth variants or input devices with wire. The security company has a list of tested parts released and the source of his tools on Github published so that users can decide which dongles with mice and keyboards even more vulnerable.Viewing:-231
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!