Thursday, January 15, 2015

Keysweeper: proof that it’s relatively simple to hack a wireless keyboard

Have you ever worried about how secure that wireless keyboard you’re using really is? A lot of Microsoft wireless keyboards are not very secure: they’re poorly encrypted, making it an easy target for a moderately skilled tech person to create a device to hack it.


For just $10, a hacker can create a camouflaged USB charging device that tracks everything you type on a keyboard. Security researcher and hacker Samy Kamkar developed the device and called it Keysweeper: a cheap and functioning USB wall charger that sniffs and hacks keystrokes made on nearby wireless keyboards and then sends it to the hacker remotely. Samy listed his research on his website on which it shows readers a step by step tutorials on how to create one.


Device can alert the hacker by SMS if certain information is typed, such as a credit card number


keysweeperKeysweeper sniffs, decrypts, logs and reports all your keywords that you enter into any wireless Microsoft keyboard. It can store and log all your input in several ways: on a chip for retrieval later, online and even onto the creator’s mobile phone. Samy’s website even explains how someone can create a similar device with a GSM chip included that can send all the input to the creator’s mobile phone. It can be programmed to send the creator a text message whenever certain keywords such as passwords, a credit card number or bank information is entered. The Keysweeper recharges when plugged in and runs off of battery when not connected to a power source.


To people being spied on, it looks like just another USB charger plugged into a wall socket making it the ultimate hacking weapon for use in public places with internet. The creator can simply put the device into a wall socket of a local library, even a business, and spy on everyone who uses a wireless keyboard nearby.


Wireless keyboard hacking: the next hacking trend?


Wireless keyboard hacking is not new. When you Google “wireless keyboard hacks” you’ll find plenty of examples. The ultimate goal of many hacks, including a wireless keyboard hack, is to get access to sensitive information such as bank accounts and passwords. The key advantages of the wireless keyboard hack over a traditional hack from a hackers perspective are:


  • The hacker doesn’t need physical access to the target PC.

  • The device is not recognizable as a spy device, while a USB stick on a target machine used in traditional hacks would be.

  • It can be a cheap and quick way to get access to a user’s keywords and ultimately passwords.

Keysweeper is an example of a sniffer. A sniffer is a program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network’s security because they are hard to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker’s arsenal.


Are wireless keyboards a security risk?


wireless_keyboardTechnically, all wireless keyboards are encrypted. But the XOR-encryption built into certain Microsoft wireless keyboards can relatively easily be hacked. XOR works by using the boolean algebra function exclusive-OR (XOR). XOR is a binary operator, meaning that it takes two arguments. By itself, using a constant repeating key, a simple XOR cipher can trivially be broken using frequency analysis.


Microsoft still sells wireless keyboards with XOR encryption, as was also pointed out by Samy since he bought the keyboard he used for his research a few weeks before at a local Best Buy store. So, unless people pay attention to what type of encryption the keyboard that they buy has, they can be vulnerable to these type of exploits. The fact that anyone with mediocre tech skills can develop a similar device for just $10 or less, is scary.


Microsoft released a statement today in response:


“Keyboards from multiple manufacturers are affected by this device. Where Microsoft keyboards are concerned, customers using our Bluetooth-enabled keyboards are protected from this type of attack. In addition, users of our 2.4GHz wireless keyboard designs from July 2011 onwards are also protected because these keyboards use Advance Encryption Standard (AES) technology.”



Going for a bluetooth or wired keyboard is still your best bet. You may have to consider whether that extra piece of wire is a price you want to pay for extra safety.


Have a great (malware-free) day!



Related Posts:


  • Research Compares USB devices to Dirty Needles – What…

  • Hacking Identity Theft: Entry points, tools and prevention

  • Managing network threats: Using Wifi securely and…

  • Chthonic trojan on the rise!

  • Hacking Identity Theft 2: More Entry Points, More Tools, And




Keysweeper: proof that it’s relatively simple to hack a wireless keyboard

Tuesday, January 13, 2015

North Korea’s official news site delivers malware

North_KoreaIf you visited the official news website of North Korea recently, chances are likely that you have installed malware on your computer. Security analysts believe that hackers planted malware on the home page in order to form a “watering hole” attack.


You can lead a horse to water, but can you make it drink?


A watering hole attack is when a hacker uses a legitimate website, or one that poses as such, to host malware. When a user visits a site that is infected, the user may be exposed to the malware. The water hole method is different from any other malware delivery method because the hacker just sits and waits for users to visit. Traditionally, malware delivery methods force the attacker to seek out victims such as sending out phishing emails with hyperlinks and attachments.


When a user visits the North Korean news website, a file called “FlashPlayer10.zip” prompts to download. Although this package is out of date because the current version of Adobe Flash Payer is 16, the chance for a regular user who is not familiar or paying close attention may opt to open the file zip file. In this case, the malware will download and then install itself. The malware is designed to steal the users passwords from the browser from which it stored on. Since the malware was just recently discovered, it is not exactly clear yet what exactly the malware does and to what extent.


Don’t just click ‘OK‘ when a site prompts you to update Flash Player!


Be careful where you surf and be vigilant of what a website is asking you to do. If a site requires an update such as Flash Player in this case – just go to the product  company website and download the update directly. In this case, at least you avoid downloading potential malware from a website that may not have a good intentions.


As always – have a good ‘malware-free’ day!



Related Posts:


  • Warning: All unpatched Drupal 7 sites assumed to be…

  • Warning: Adobe Flash Zero Day CVE-2014-0515

  • The Huffington Post hacked! Advertisements were laced with…

  • Adobe Flash Zero Day: Operation GreedyWonk

  • Alert: All in One SEO WordPress Plugin Vulnerable




North Korea’s official news site delivers malware

Monday, January 12, 2015

Hackers Anonymous declare (cyber)war on terrorists after Paris attacks

33483102_sThe largest hackers group in the world, Anonymous, released a video condemning the attacks on Charlie Hebdo in Paris, in which 12 people, including eight journalists, were murdered. The video, originally released in French, was uploaded to the group’s Belgian YouTube account and quickly went viral. In the video the Anonymous group declare war on Al-Qaeda, the Islamic State and other terrorists.


The group promises the world to track online activity, close social media accounts and jihadist websites of terrorists plus everything else in their power to shut terrorists down. Online, at least.


In the video, a figure wearing the group’s symbolic mask states that the press release targets “the enemies of freedom of expression”. The figure then declares war on terrorists on behalf of Anonymous of the entire planet.


anonymous2


 


“You allowed yourselves to kill innocent people. We will therefore avenge their deaths. We will track all of your activities online. We will close your accounts on all social networks. You will not impose your sharia in our democracies.”



The message later continues: “we are Anonymous, we are legion, we do not forget, we do not forgive: be afraid of us.”


hackers1


The group also released a statement posted on text-sharing website Pastebin: “we fight always and everywhere the enemies of freedom of expression … Freedom of expression and opinion is a non-negotiable thing. To tackle it is to attack democracy. Expect a massive frontal reaction from us because the struggle for the defense of those freedoms is the foundation of our movement.”


The group calls the operation OpCharlieHebdo, and designated a separate Twitter profile for the operation under which it posts messages with the hashtag #OpCharlieHebdo. At the time of posting, the group Tweeted that their attacks have started and that they took down a French jihadist website on Saturday.


Anonymous3


The hacker group hasn’t announced how they took down the website, but it is suspected that they did it with a Distributed Denial of Service (DDoS) attack. This common hacking method is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources at the same time, which overloads the website servers and takes it down. Anonymous is also urging supporters to “find terrorists twitter profiles and report them.”


Anonymous has previously carried out cyber attacks on websites belonging to the government, as well as those of corporate and religious organizations. They have been linked to online attacks around the world aimed at punishing governments for policies of which the hackers disapprove. Now, the largest hackers group in the world aims to go a step further by declaring (cyber)war on terrorists.


Hacking for a good cause


Hacktivist – which is hacking for an ideal cause, is not new. Also called white hat hacking, ethical hacking or legal hacking, it’s pretty common for businesses and government-related organizations that are serious about their network security to hire ethical hackers to help probe and improve their networks, applications, and other computer systems. The ultimate goal is to prevent data theft, data loss and fraud.


Terrorists may have created an unexpected enemy in Anonymous. Given their reputation and the skills they have shown the world so far, they can inflict substantial cyber-damage. Just how much? We will have to wait and see.

Have a great (malware-free) day!



Related Posts:


  • Small business owners beware, phone system hacks can cost…

  • The World Cup and Malware

  • U.S. sends scary message to hackers, but the truth is even…

  • Emsisoft Explains the Syrian Electronic Army

  • Google Maps Hackers Sinking Businesses to the Bottom of the…




Hackers Anonymous declare (cyber)war on terrorists after Paris attacks

Friday, January 2, 2015

Pirated downloads of The Interview spread malware to Android devices

The_InterviewIn the past 24 hours, malware has spread to Android devices through an app called Android/Badaccents. The app claims to download the movie The Interview, but instead  torments Android users who download the app with a banking trojan that aims to track and remove financial information from mobile devices. Users who elect to download the pirated movie using Android/Badaccents are subject to a big risk of infection and the malware has the capability to spread further once it is installed. Android/Badaccents has currently infected more than 20,000 Android users.


Android/Badaccents delivered via TorrentsAmazon-web-services


Users can download the movie from a torrent file through Amazon Web Services. From there, the Trojan is very selective on what device it will execute its mission and when not. It has been reported that North Korean Android devices have not been targeted, while South Korean banking as well as the international bank Citi Bank have been targeted with the malware. The Interview is one of the hottest torrent movies at the moment after Sony Pictures got hacked.


140423_androidProtect your Android device – Don’t Pirate!


In order to prevent your Android device from being infected, ensure that you only download or rent movies from a legitimate source such as Xbox Live, YouTube or iTunes – to name a few. Sourcing a pirated copy is illegal and introducing the threat can potentially cost you way more from identity theft rather than renting the movie for USD$6.


 



Related Posts:


  • Android Alert: Selfmite spams all your contacts through SMS

  • Sony got hacked (again!) – no Playstation this…

  • Android Outbreak: Koler ransomware has learned how to worm

  • Preview: Emsisoft Mobile Security offers protection for your

  • BadLepricon Mobile Malware Mines for Bitcoin Gold




Pirated downloads of The Interview spread malware to Android devices

Pirated downloads of The Interview spread malware to Android devices

The_InterviewIn the past 24 hours, malware has spread to Android devices through an app called Android/Badaccents. The app claims to download the movie The Interview, but instead  torments Android users who download the app with a banking trojan that aims to track and remove financial information from mobile devices. Users who elect to download the pirated movie using Android/Badaccents are subject to a big risk of infection and the malware has the capability to spread further once it is installed. Android/Badaccents has currently infected more than 20,000 Android users.


Android/Badaccents delivered via TorrentsAmazon-web-services


Users can download the movie from a torrent file through Amazon Web Services. From there, the Trojan is very selective on what device it will execute its mission and when not. It has been reported that North Korean Android devices have not been targeted, while South Korean banking as well as the international bank Citi Bank have been targeted with the malware. The Interview is one of the hottest torrent movies at the moment after Sony Pictures got hacked.


140423_androidProtect your Android device – Don’t Pirate!


In order to prevent your Android device from being infected, ensure that you only download or rent movies from a legitimate source such as Xbox Live, YouTube or iTunes – to name a few. Sourcing a pirated copy is illegal and introducing the threat can potentially cost you way more from identity theft rather than renting the movie for USD$6.


 



Related Posts:


  • Android Alert: Selfmite spams all your contacts through SMS

  • Sony got hacked (again!) – no Playstation this…

  • Android Outbreak: Koler ransomware has learned how to worm

  • Preview: Emsisoft Mobile Security offers protection for your

  • BadLepricon Mobile Malware Mines for Bitcoin Gold




Pirated downloads of The Interview spread malware to Android devices

Pirated downloads of The Interview spread malware to Android devices

The_InterviewIn the past 24 hours, malware has spread to Android devices through an app called Android/Badaccents. The app claims to download the movie The Interview, but instead  torments Android users who download the app with a banking trojan that aims to track and remove financial information from mobile devices. Users who elect to download the pirated movie using Android/Badaccents are subject to a big risk of infection and the malware has the capability to spread further once it is installed. Android/Badaccents has currently infected more than 20,000 Android users.


Android/Badaccents delivered via TorrentsAmazon-web-services


Users can download the movie from a torrent file through Amazon Web Services. From there, the Trojan is very selective on what device it will execute its mission and when not. It has been reported that North Korean Android devices have not been targeted, while South Korean banking as well as the international bank Citi Bank have been targeted with the malware. The Interview is one of the hottest torrent movies at the moment after Sony Pictures got hacked.


140423_androidProtect your Android device – Don’t Pirate!


In order to prevent your Android device from being infected, ensure that you only download or rent movies from a legitimate source such as Xbox Live, YouTube or iTunes – to name a few. Sourcing a pirated copy is illegal and introducing the threat can potentially cost you way more from identity theft rather than renting the movie for USD$6.


 



Related Posts:


  • Android Alert: Selfmite spams all your contacts through SMS

  • Sony got hacked (again!) – no Playstation this…

  • Android Outbreak: Koler ransomware has learned how to worm

  • Preview: Emsisoft Mobile Security offers protection for your

  • BadLepricon Mobile Malware Mines for Bitcoin Gold




Pirated downloads of The Interview spread malware to Android devices

Pirated downloads of The Interview spread malware to Android devices

The_InterviewIn the past 24 hours, malware has spread to Android devices through an app called Android/Badaccents. The app claims to download the movie The Interview, but instead  torments Android users who download the app with a banking trojan that aims to track and remove financial information from mobile devices. Users who elect to download the pirated movie using Android/Badaccents are subject to a big risk of infection and the malware has the capability to spread further once it is installed. Android/Badaccents has currently infected more than 20,000 Android users.


Android/Badaccents delivered via TorrentsAmazon-web-services


Users can download the movie from a torrent file through Amazon Web Services. From there, the Trojan is very selective on what device it will execute its mission and when not. It has been reported that North Korean Android devices have not been targeted, while South Korean banking as well as the international bank Citi Bank have been targeted with the malware. The Interview is one of the hottest torrent movies at the moment after Sony Pictures got hacked.


140423_androidProtect your Android device – Don’t Pirate!


In order to prevent your Android device from being infected, ensure that you only download or rent movies from a legitimate source such as Xbox Live, YouTube or iTunes – to name a few. Sourcing a pirated copy is illegal and introducing the threat can potentially cost you way more from identity theft rather than renting the movie for USD$6.


 



Related Posts:


  • Android Alert: Selfmite spams all your contacts through SMS

  • Sony got hacked (again!) – no Playstation this…

  • Android Outbreak: Koler ransomware has learned how to worm

  • Preview: Emsisoft Mobile Security offers protection for your

  • BadLepricon Mobile Malware Mines for Bitcoin Gold




Pirated downloads of The Interview spread malware to Android devices