security alert: your wireless mouse or keyboard can be hacked
by:CTECHi
2019-12-23
If you use a wireless mouse or keyboard, you may be attacked by a hacker.
Researchers at the Bastille found in January 2016 that attackers could use a cheap $15 antenna to sneak into your computer with a wireless mouse or keyboard dongle (receiver).
For example, an attacker can enter your computer using a cheap antenna disguised as a wireless mouse.
From there, the intruder can switch signals to simulate the wireless keyboard and gain control over the machine.
Found that this technique works from 200 (
Sometimes even 225)
So even if the attacker can\'t see your screen, he or she can do anything using keyboard commands, from opening the site to downloading malware to your computer --
Even wipe your hard drive clean.
So far, Bastille is in Africa.
Bluetooth wireless mouse and keyboard radio receivers made by Amazon basics, Dell, Gigabyte, HP, Lenovo, Logitech and Microsoft.
Fortunately, you can take some action.
First, turn it off if you are not using a wireless device.
The antenna depends on the dongle being active and the dongle will not look for a signal if your device is off. (
You can also unplug it. )
Of course, it doesn\'t help much if you use the mouse or keyboard.
Unless you\'re using Logitech or Microsoft products, there\'s really nothing you can do at the moment.
Amazon affected miceamazon basic affected wireless mouse will not receive any updates, and it is not known if Amazon has fixed this issue in a newer model.
The bottom of the bus pointed out that it is a wireless mouse MG-
USB dongle RG-0975
0976, affected.
Dell Mice & KeyboardsDell issued a statement saying it is looking into the issue, but has not mentioned any updates to the mouse and keyboard that has been sold since.
Bastille notes Dell KM714 wireless keyboard and mouse combination;
KM714 USB dongle;
And the KM632 wireless mouse USB dongle is affected.
Gigabyte KeyboardsGigabyte has never disclosed an update to its keyboard, and has never even admitted that there is a problem with its keyboard.
The bottom of the bus pointed out that the K7600 Wireless Keyboard USB dongle was affected.
HP keyboard-
Packard has never made public an update to its keyboard, and has never even acknowledged a keyboard issue.
Bastille noted that the wireless Elite v2 Keyboard Elite USB dongle was affected.
The Lenovo mouse and keyboard are 500 affected-
Series keyboard and mouse models.
Note 500 wireless mouse at the bottom of the bus (MS-436)
The 500 USB dongle is affected.
If you have a Logitech G900 gaming mouse, you can update its firmware on a Windows PC using G900 update_1. 5. 23. exe.
Bastille pointed out that the unified dongle of K3 60, K400r, K750 and K830 was affected, while the dongles C-U0007 and C-
U0008, Logitech G900 and Logitech G900 dongle C-U0008.
Logitech has released fixes for its unified receiver, so let\'s see how to update the firmware and stop worrying about this.
This patch is only available for Logitech wireless keyboard and mouse with unified logo.
A patch is provided for Windows and macOS, but Linux does not state any issues.
If you are a Mac user, just download the ZIP file, decompress it, then open the SecureDFU app, follow on-
Screen description.
The instructions for Windows PC are similar, just download and run SecureDFU. exe file.
Bastille claims that Microsoft Mice & keyboard smicrosoft offers a firmware update that may or may not work, and the mouse that is part of the combo set is still vulnerable.
Affected products include an ergonomic mouse in shape, a Wireless Mobile Mouse 4000, a Microsoft Wireless Mouse 5000, and 2.
4GHz transceiver v7.
0, USB dongle model 1496 and USB dongle model 1461, other patches and affected devices please open your eyes to see if the manufacturer of the wireless mouse or keyboard announces the repair.
We will do the same and let you know as soon as we find out.
Just because you have a wireless mouse made by someone who is not on this list can\'t guarantee your safety --
The bottom of the bus may not have been tested yet.
If you\'re an aspiring zero byte hacker, it\'s time to break the extra mouse you have and learn one or two things.
For more information, please visit the Mouse jack.
Com, you can view the details of the keystrokes and forced pairing techniques in its White Paper.
Researchers at the Bastille found in January 2016 that attackers could use a cheap $15 antenna to sneak into your computer with a wireless mouse or keyboard dongle (receiver).
For example, an attacker can enter your computer using a cheap antenna disguised as a wireless mouse.
From there, the intruder can switch signals to simulate the wireless keyboard and gain control over the machine.
Found that this technique works from 200 (
Sometimes even 225)
So even if the attacker can\'t see your screen, he or she can do anything using keyboard commands, from opening the site to downloading malware to your computer --
Even wipe your hard drive clean.
So far, Bastille is in Africa.
Bluetooth wireless mouse and keyboard radio receivers made by Amazon basics, Dell, Gigabyte, HP, Lenovo, Logitech and Microsoft.
Fortunately, you can take some action.
First, turn it off if you are not using a wireless device.
The antenna depends on the dongle being active and the dongle will not look for a signal if your device is off. (
You can also unplug it. )
Of course, it doesn\'t help much if you use the mouse or keyboard.
Unless you\'re using Logitech or Microsoft products, there\'s really nothing you can do at the moment.
Amazon affected miceamazon basic affected wireless mouse will not receive any updates, and it is not known if Amazon has fixed this issue in a newer model.
The bottom of the bus pointed out that it is a wireless mouse MG-
USB dongle RG-0975
0976, affected.
Dell Mice & KeyboardsDell issued a statement saying it is looking into the issue, but has not mentioned any updates to the mouse and keyboard that has been sold since.
Bastille notes Dell KM714 wireless keyboard and mouse combination;
KM714 USB dongle;
And the KM632 wireless mouse USB dongle is affected.
Gigabyte KeyboardsGigabyte has never disclosed an update to its keyboard, and has never even admitted that there is a problem with its keyboard.
The bottom of the bus pointed out that the K7600 Wireless Keyboard USB dongle was affected.
HP keyboard-
Packard has never made public an update to its keyboard, and has never even acknowledged a keyboard issue.
Bastille noted that the wireless Elite v2 Keyboard Elite USB dongle was affected.
The Lenovo mouse and keyboard are 500 affected-
Series keyboard and mouse models.
Note 500 wireless mouse at the bottom of the bus (MS-436)
The 500 USB dongle is affected.
If you have a Logitech G900 gaming mouse, you can update its firmware on a Windows PC using G900 update_1. 5. 23. exe.
Bastille pointed out that the unified dongle of K3 60, K400r, K750 and K830 was affected, while the dongles C-U0007 and C-
U0008, Logitech G900 and Logitech G900 dongle C-U0008.
Logitech has released fixes for its unified receiver, so let\'s see how to update the firmware and stop worrying about this.
This patch is only available for Logitech wireless keyboard and mouse with unified logo.
A patch is provided for Windows and macOS, but Linux does not state any issues.
If you are a Mac user, just download the ZIP file, decompress it, then open the SecureDFU app, follow on-
Screen description.
The instructions for Windows PC are similar, just download and run SecureDFU. exe file.
Bastille claims that Microsoft Mice & keyboard smicrosoft offers a firmware update that may or may not work, and the mouse that is part of the combo set is still vulnerable.
Affected products include an ergonomic mouse in shape, a Wireless Mobile Mouse 4000, a Microsoft Wireless Mouse 5000, and 2.
4GHz transceiver v7.
0, USB dongle model 1496 and USB dongle model 1461, other patches and affected devices please open your eyes to see if the manufacturer of the wireless mouse or keyboard announces the repair.
We will do the same and let you know as soon as we find out.
Just because you have a wireless mouse made by someone who is not on this list can\'t guarantee your safety --
The bottom of the bus may not have been tested yet.
If you\'re an aspiring zero byte hacker, it\'s time to break the extra mouse you have and learn one or two things.
For more information, please visit the Mouse jack.
Com, you can view the details of the keystrokes and forced pairing techniques in its White Paper.
Custom message