KeySniffer sniffs out your keystrokes from 250 feet away

Malware affecting cheap wireless keyboards gives hackers your card data

Malware affecting wireless keyboards can track people's keystrokes to discover their private data, cybersecurity researchers have warned.

Dubbed KeySniffer', the malware works from a distance of up to 250ft, allowing hackers to remotely monitor people's every keystroke, obtaining the data in plain text.

The hackers can then search the plain text data for people's card numbers, bank account usernames and passwords, answers to security questions, network access passwords and sensitive business data.

Bastille, the cybersecurity firm that unvocered the flaw, called it a "massive vulnerability" and said it affects eight major wireless keyboards from companies including HP Inc and Toshiba.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Marc Newlin, a Bastille researcher who discovered KeySniffer, said: "When we purchase a wireless keyboard we reasonably expect that the manufacturer has designed and built security into the core of the product.

"Unfortunately, we tested keyboards from 12 manufacturers and were disappointed to find that eight manufacturers (two-thirds) were susceptible to the KeySniffer hack."

The malware does not affect Bluetooth keyboards from the likes of Logitech, Dell and Lenovo, the firm found, adding: "Vulnerable keyboards are easy for hackers to detect as they are always transmitting, whether or not the user is typing. Consequently, a hacker can scan a room, building, or public area for vulnerable devices at any time."

But the affected keyboards cannot be upgraded, and people using them must replace them with new devices, Bastille warned, saying it had told the affected manufacturers about the vulnerability.

Kaspersky's principal security researcher, David Emm, said: "As with any digital device that is connected to the internet, if it isn't secure it can be compromised and the data you transmit can be intercepted.

"It's vital that manufacturers of such devices consider security at the design stage, not least because trying to retro-fit security is likely to be a lot more difficult. It's also vital the consumers consider the potential dangers posed by insecure wireless devices when making purchasing decisions."

Advertisement - Article continues below

A full list of the affected keyboards can be found here.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/security/cyber-security/354468/if-not-passwords-then-what
cyber security

If not passwords then what?

8 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Visit/policy-legislation/31772/gdpr-and-brexit-how-will-one-affect-the-other
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020