Here’s How A Computer Can Be Hacked Through Its Wireless Keyboard Or Mouse?

Omar Sohail
Posted Feb 25, 2016
54Shares
Share Tweet Submit

Turns out that hackers are so sophisticated that they can infiltrate a computer that possesses no working internet connection and no Bluetooth devices (assuming they are performing the task from a reasonable range).

1738-00

Your Computer Can Be Hacked Through Non-Bluetooth Devices – Here Is How This Is Made Possible

If your machine is not connected to a Bluetooth keyboard or mouse, then hackers have a very high probability of hacking into your machine and install Malware or Rootkit onto it. That mini dongle that comes along with the wireless accessory and gets plugged into the vacant USB port of your computer will act as a gateway for these hackers to fulfill their nefarious intentions. How so? Well, according to security researchers from the Internet of things security firm Bastille, they have stated there are a total of five companies that mass product wireless keyboards and mice that have been found vulnerable and they have been listed below:

  • Logitech
  • Dell
  • Microsoft
  • HP
  • Lenovo

The method used to hack machines is called MouseJacking, and it potentially leaves billions of computers vulnerable to hackers. The flaw actually resides in the way these wireless mice and their corresponding radio receivers handle encryption. The connection between the tiny dongle and the mouse is not encrypted; thus, the dongle would accept any seemingly valid command. So how exactly is the computer able to get hacked?

Wireless mice and keyboards are able to communicate through radio frequency with a USB dongle that is inserted into the PC. This dongle then sends packets to the PC, so it follows the mouse clicks or keyboard types. Even though most wireless keyboard manufacturers encrypt traffic between the keyboard and the dongle in an effort to prevent spoofing or hijacking of the device, there are some companies that do not follow the same approach, leaving attackers open to plan out their malevolent plans to completion.

Logitech_unifying_receiver_605

All these hackers need to do is to invest in a $15-$30 long-range radio dongle and enter a few lines of code and voila. The attack could allow a malicious hacker within 100 meters range of your computer to intercept the radio signal between the dongle plugged into your computer and your mouse. During the test, the researchers were able to generate 1000 words/minute over the wireless connection and install a malicious Rootkit in about 10 seconds. Any skilled hacker could achieve the same result in the same amount of time.

There is even a video posted below showing how this is possible so be sure to watch that in order to educate yourself on not to invest in a non-Bluetooth device. If you want to adopt a wireless desktop or laptop system, then it is imperative that your surroundings are not playing host to a malicious hacker.

Source

Share Tweet Submit