Skip to main content

A Number of Popular Wireless Keyboards Can Be Easily Hacked

By August 10, 2016May 25th, 2021Blog, Cybersecurity

AXNumberXofXPopularXWirelessXKeyboardsXCanXBeXEasilyXHackedIn recent months, we’ve seen an upsurge in the number of attacks that have been executed by exploiting wireless peripherals attached to computers. Hackers can even intercept signals sent to your PC via wireless mouse and use them for their own purposes.

If they can do it to a wireless mouse, then a keyboard is actually rather straightforward. Wireless peripherals suffer from the same basic limitations and risks present in the growing legion of internet devices proliferating our society. Almost none of them have any kind of security, a fact that hackers are well aware of.

Recently, wireless security vendor Bastille has reported a critical vulnerability across at least eight major brands of wireless keyboards that allow hackers read keystrokes entered by a user from up to 250 feet away. All they need is a dongle that can be fashioned from off the shelf technology for less than a hundred dollars.

Theirs was not an especially rigorous study, and the researchers simply tested the keyboards they had readily available, so they were quick to point out that the problem may be much more widespread than their report indicates – additional testing is needed. However, their findings were disturbing enough, with the vulnerability impacting wireless keyboards made by:

Eagle Tec

All of these use transceivers from MOSART semiconductors, save for the keyboards made by Toshiba, which use transceivers from Signia Technologies and GE, which uses transceivers from an unknown supplier.

All of the transceivers have something in common. They all operate on the 2.4 GHz ISM radio band. This band lacks standards for how secured data should be transmitted, leaving it up to each vendor to come up with its own methodology…or not. Most vendors, being cost conscious, simply opt not to.

The researchers created a wireless dongle that fit into the attacker’s laptop that was based on an existing dongle used to control a cheap quadracopter drone. Using the modified dongle, they were able to scan for, and lock onto the signal of wireless keyboards. Once locked on, they could start capturing keystrokes from as far as 250 feet away, with an accuracy of 100%.

This underscores the incredible dangers that unsecured peripherals pose. To a determined hacker, it’s never been easier to breach your company’s defenses.

Jason Manteiga

Jason J. Manteiga, Vice President of Olmec Systems, has been part of the company for over the past 20 years. He believes that having a great work environment and supportive team, is the ultimate key to success. Since being in the IT realm for over 25 years, Jason, along with Olmec Systems, has been on the Inc. 5000 “List of America’s Fastest Growing Private Companies” and Channel Futures MSP 501 “Top Managed Service Providers in North America,” along with other awards and nominations. Jason earned his Bachelor Degree in Information Systems from the New Jersey Institute of Technology. He also holds certifications in Microsoft MCSE, VMWare VCP, and Cisco CCNA. In his spare time, Jason is a contributor for The Center for Social & Legal Research (Privacy Exchange) and a member of the Morris County Chamber of Commerce. His hobbies include cycling and kayaking. He currently lives in New Jersey with his wife, two daughters and son.