Hackers pop top 'secure' wireless keyboard and mouse kits, gain RCE

Patch? Nah, we'll just remove 'secure' from the tin: vendor

Ruxcon Wireless keyboard and mouse manufacturers including Microsoft, Fujitsu, and Logitech have been forced to fix borked encryption in peripherals that allow physical attackers to hijack computers.

Researchers and phDs Gerhard Klostermeier and Matthias Deeg with Germany-based security firm SySS tested five devices badged as secure including the Cherry AES B.Unlimited and Perixx Periduo-710W.

Klostermeier demonstrated to the Ruxcon hacking confab in Melbourne how each test subject permitted keystroke injection, mouse spoofing, replay attacks, and all but the Logitech set up had lax code protections.

The keyboard and mouse devices cannot be patched in existing products so four of the five vendors committed to fixing the bugs in newer editions.

Perixx did not respond to Klostermeier's and Deeg's private disclosures.

Cherry told the pair it will remove references to its product as secure instead of fixing the issues, and urged customers with high security requirements to use wired peripherals.

The remaining vendors played down some attacks and promised some fixes for upcoming products. Microsoft will fix replay attacks, will assess insufficient code protections, but will not shutter a mouse spoofing vector which it says is a feature, not a bug.

The duo wrapped the attacks into a tidy Raspberry Pi "Radio Hack Box" which could, if planted nearby, allow otherwise locked machines to be compromised.

The Radio Hack Box prototype

It will allow attackers to spoof keyboard and mouse inputs for remote code execution, and use replay attacks to steal cleartext keystrokes so attackers can look for login credentials.

Klostermeier says the attack could be amplified with radio equipment to extend the keyboard and mouse attack from 15 metres to "several kilometres".

"You can exploit all of these vulnerabilities in real world attack scenarios," Klostermeier says.

"The normal distance is 10 to 15 metres but if you use software defined radio and apply some antenna you could extend it to several kilometres."

Klostermeier's and Deeg's attack uses an internal Python tool that inputs keystrokes into command using the inbuilt Windows virtual keyboard to run attack commands. It also uses with the Crazyradio PA USB device, and leverages Bastille's nrf research firmware to pull off the attacks.

The pair published a proof-of-concept video demonstrating the three-minute attack against the Microsoft Wireless Desktop 2000 which they say can be sped up to reduce time to compromise.

Their work joins efforts by internet-of-radio-things security company Bastille which in July hosed low-cost wireless keyboard and mouse setups through a bug it called KeySniffer. ®

Youtube Video

Broader topics

Other stories you might like

  • Despite global uncertainty, $500m hit doesn't rattle Nvidia execs
    CEO acknowledges impact of war, pandemic but says fundamentals ‘are really good’

    Nvidia is expecting a $500 million hit to its global datacenter and consumer business in the second quarter due to COVID lockdowns in China and Russia's invasion of Ukraine. Despite those and other macroeconomic concerns, executives are still optimistic about future prospects.

    "The full impact and duration of the war in Ukraine and COVID lockdowns in China is difficult to predict. However, the impact of our technology and our market opportunities remain unchanged," said Jensen Huang, Nvidia's CEO and co-founder, during the company's first-quarter earnings call.

    Those two statements might sound a little contradictory, including to some investors, particularly following the stock selloff yesterday after concerns over Russia and China prompted Nvidia to issue lower-than-expected guidance for second-quarter revenue.

    Continue reading
  • Another AI supercomputer from HPE: Champollion lands in France
    That's the second in a week following similar system in Munich also aimed at researchers

    HPE is lifting the lid on a new AI supercomputer – the second this week – aimed at building and training larger machine learning models to underpin research.

    Based at HPE's Center of Excellence in Grenoble, France, the new supercomputer is to be named Champollion after the French scholar who made advances in deciphering Egyptian hieroglyphs in the 19th century. It was built in partnership with Nvidia using AMD-based Apollo computer nodes fitted with Nvidia's A100 GPUs.

    Champollion brings together HPC and purpose-built AI technologies to train machine learning models at scale and unlock results faster, HPE said. HPE already provides HPC and AI resources from its Grenoble facilities for customers, and the broader research community to access, and said it plans to provide access to Champollion for scientists and engineers globally to accelerate testing of their AI models and research.

    Continue reading
  • Workday nearly doubles losses as waves of deals pushed back
    Figures disappoint analysts as SaaSy HR and finance application vendor navigates economic uncertainty

    HR and finance application vendor Workday's CEO, Aneel Bhusri, confirmed deal wins expected for the three-month period ending April 30 were being pushed back until later in 2022.

    The SaaS company boss was speaking as Workday recorded an operating loss of $72.8 million in its first quarter [PDF] of fiscal '23, nearly double the $38.3 million loss recorded for the same period a year earlier. Workday also saw revenue increase to $1.43 billion in the period, up 22 percent year-on-year.

    However, the company increased its revenue guidance for the full financial year. It said revenues would be between $5.537 billion and $5.557 billion, an increase of 22 percent on earlier estimates.

    Continue reading

Biting the hand that feeds IT © 1998–2022