Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Hacker demos persistent Mac keyboard attack
ZDNet News & Blogs ^ | August 3, 2009 | Posted by Ryan Naraine

Posted on 08/03/2009 9:16:26 PM PDT by Swordmaker

Apple’s sleek $49 Mac keyboards can be hacked and infected with keystroke loggers and impossible-to-detect rootkits, according to a security researcher presenting at this year’s Black Hat/DEFCON conferences.

The researcher, known only as “K. Chen,” found a way to reverse engineer and tamper with the keyboard’s firmware upgrade. With the firmware under control, an attacker can subvert the keyboard by embedding malicious code that allows a rootkit to survive a clean re-installation of the host operating system.

Chen, from the Georgia Institute of Technology, said malicious code embedded into the firmware would be immune to the typical rootkit detection methods which examine the integrity of the filesystem, check for hooks or direct kernel object manipulation, or detect hardware and/or timing discrepancies due to virtualization in the case of a virtual-machine based rootkit.

“Such code could also completely bypass the remote attestation of a Trusted Platform Module, if one were present in the computer. As far as everybody is concerned, our [malicious keyboard] code is simply the user typing commands at the keyboard,” he explained.

Chen said a malicious keyboard can be used to snoop on keystrokes from any machine it is plugged into.

Here’s a technical paper discussing the keyboard firmware attack. In the video below, Chen demonstrates the attack for George Ou.

You Tube Video.

Ryan Naraine is a journalist and security evangelist at Kaspersky Lab. He manages Threatpost.com, a security news portal. Here is Ryan's full profile and disclosure of his industry affiliations.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: maccult; macvirus
Navigation: use the links below to view more comments.
first 1-2021-32 next last
Physical access to either the computer or prior possession of the keyboard is required for this exploit to be installed on the keyboard. The paper notes that this exploit is not limited to Mac keyboards but applies to any "smart" PC keyboard that uses firmware, which means most keyboards with more than the basic keys. K Chen used an Apple keyboard because that is what he uses... it could just as easily have been on any PC keyboard with extra functional keys such as Logitech and Microsoft keyboards.

It looks to me as if the hacker has found a way to capture the keyboard buffer and dump it. Not good for any computer user. Getting the data from the computer connected to the hexed keyboard to the hacker who wants the data is another matter entirely. That would require something (like spyware) on the target computer to send it on. Keyboard firmware is not checked by any anti-malware apps that I know of.

1 posted on 08/03/2009 9:16:27 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; aristotleman; ...
Watch out for malicious, hijacked keyboards on Macs... and other computers PING!

Thanks to Leonard210 for the heads up!


Mac Keyboard Hacker Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 08/03/2009 9:20:48 PM PDT by Swordmaker (remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Hacker demos persistent Mac keyboard attack

Guess, macs, not unlike obama, aren't nirvana after all.

3 posted on 08/03/2009 9:23:38 PM PDT by the invisib1e hand (The revolution IS being televised.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

neener


4 posted on 08/03/2009 9:24:46 PM PDT by mamelukesabre (Si Vis Pacem Para Bellum (If you want peace prepare for war))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

So, it sounds as if you somehow get keyboard that has been tampered with, a firmware update that is bogus, or someone has physical access to your keyboard and hacks it, you are in deep doo-doo.

So, someone could go into a workplace with a laptop, unplug a keyboard, plug it into their laptop and modify it, then plug it back in with nobody the wiser.

Crap.


5 posted on 08/03/2009 9:27:04 PM PDT by rlmorel ("The Road to Serfdom" by F.A.Hayek - Read it...today.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: the invisib1e hand

You do realize this is a hazard to any keyboard that has firmware in it, right? Not just Mac keyboards?


6 posted on 08/03/2009 9:28:41 PM PDT by rlmorel ("The Road to Serfdom" by F.A.Hayek - Read it...today.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: the invisib1e hand

Read the article. The exploit is for all firmware-loading keyboards, including those manufactured by Microsoft and Logitech.

The headline highlights Apple’s wireless keyboard because headlines involving Apple get clicked more: reference the GSM SMS exploit which was demonstrated on a Sony Ericsson phone, yet was reported in the tech media as an iPhone exploit.


7 posted on 08/03/2009 9:29:04 PM PDT by Terpfen (FR is being Alinskied. Remember, you only take flak when you're over the target.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: rlmorel

Wouldn’t it be just as easy for the user to flash his firmware with the correct version and thus, make sure everything is “okay”?


8 posted on 08/03/2009 9:31:13 PM PDT by Star Traveler (The God of Abraham, Isaac and Jacob is a Zionist and Jerusalem is the apple of His eye.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: the invisib1e hand
Guess, macs, not unlike obama, aren't nirvana after all.

First you gotta get the malicious firmware revision onto the Mac's keyboard. That means getting the malware on the Mac that will install it on the keyboard and manage the data coming back from the keyboard AND keep it from being seen on the screen... on a Mac, about the only way to do that is with a Trojan. I am not going to be too worried about it.

Note also that this works on ANY computer and Any keyboard with firmware... if it's got firmware, it can be compromised.That would be any keyboard that requires a driver on PCs. Comparing the ease of compromising Macs with malware and compromising Windows XP with malware, I think that would more likely occur on Windows than on Macs.

9 posted on 08/03/2009 9:32:01 PM PDT by Swordmaker (remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: rlmorel

It also seems like it would not be a problem for software to be made which would read the firmware, compare it to the current version of the firmware and note if there was any differences.


10 posted on 08/03/2009 9:33:00 PM PDT by Star Traveler (The God of Abraham, Isaac and Jacob is a Zionist and Jerusalem is the apple of His eye.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Star Traveler

I don’t know, but I seem to recall there is often a problem going backwards with firmware in certain cases, and there has to be a special executable that can specifically undo it, not just running the previous firmware upgrade.

Anyone have knowledge of this?


11 posted on 08/03/2009 9:36:26 PM PDT by rlmorel ("The Road to Serfdom" by F.A.Hayek - Read it...today.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker

1. Did you hook up your own keyboard?

2. Has your keyboard every been out of your possession since you hooked it up?


12 posted on 08/03/2009 9:40:54 PM PDT by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I thought they only needed to fool the user into installing a hacked keyboard firmware update, so no physical access is required.


13 posted on 08/03/2009 9:51:42 PM PDT by dr_who
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker; the invisib1e hand; rlmorel
Once again, an attack on a peripheral used with ANY desktop PC or laptop makes the news -- because it was demonstrated on a (GASP! Horrors!) Apple product. If it were demonstrated on a Microsoft or other smart keyboard, it would be a total yawner, right? Sheesh.

It's good that the DEFCON BlackHat guys point up vulnerabilities, and I'm very glad they do. And this one is definitely interesting.

But the tech press and their breathless eagerness to pair up the word "Mac" with anything negative in a headline are really quite tiresome.

14 posted on 08/03/2009 9:53:41 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rlmorel
There are lots of mac haters out there. They love stories like this.

---------------------------------------------------------

Sent from my Macbook Pro.

15 posted on 08/03/2009 9:55:02 PM PDT by LimaLimaMikeFoxtrot ("The rights of the people have been bartered for promises of office". ~Andrew Jackson)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Talisker
1. Did you hook up your own keyboard?

2. Has your keyboard every been out of your possession since you hooked it up?

Yes. No.

The data the keyboard sends is sent only to the computer it's connected to. To get it any farther, it must be managed by something on the computer that connects to the internet to send the data on to the hacker. The keyboard cannot do that. I know what is running on my computer.

16 posted on 08/03/2009 10:18:05 PM PDT by Swordmaker (remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: dr_who
I thought they only needed to fool the user into installing a hacked keyboard firmware update, so no physical access is required.

Psychological attack is a method of making the user the agent of the hacker... the agent has to have physical access to install the installer.

There are currently no drive-by installations of software on a Mac without the involvement of someone with administrator access. If that administrator is foolish enough to trust un-trustworthy sites or install files received in email, then no one can protect him from himself.

17 posted on 08/03/2009 10:21:15 PM PDT by Swordmaker (remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker
Yes. No.

Congratulations - you are cleared to fly.

; )

18 posted on 08/03/2009 10:21:28 PM PDT by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Swordmaker
I saw another hack that was done using a 12 gauge shotgun and threats of violence. After acquiring the login password, the Mac was compromised in less than two minutes.

I try to be alert, but most of these hacks they've been touting require physical possession of the hardware. If they get the hardware, you're pretty much pwned, no matter what else happens.

19 posted on 08/03/2009 10:38:49 PM PDT by Richard Kimball (We're all criminals. They just haven't figured out what some of us have done yet.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Richard Kimball
If they get the hardware, you're pretty much pwned, no matter what else happens.

Yeah, that's pretty much a "given" in the world of computer security -- no OS is going to stop am attacker who has physical access and enough time.

In this case, of course, the computer itself isn't even compromised -- the keyboard is. And without a subsequent compromise of the computer, the attacker would need physical access a second time to the keyboard to extract the captured data, if I'm reading this correctly.

20 posted on 08/04/2009 3:31:19 AM PDT by kevkrom (Obama: Stuck on "Stupidly")
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-32 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson