Posted on 08/03/2009 9:16:26 PM PDT by Swordmaker
It looks to me as if the hacker has found a way to capture the keyboard buffer and dump it. Not good for any computer user. Getting the data from the computer connected to the hexed keyboard to the hacker who wants the data is another matter entirely. That would require something (like spyware) on the target computer to send it on. Keyboard firmware is not checked by any anti-malware apps that I know of.
Thanks to Leonard210 for the heads up!
If you want on or off the Mac Ping List, Freepmail me.
Guess, macs, not unlike obama, aren't nirvana after all.
neener
So, it sounds as if you somehow get keyboard that has been tampered with, a firmware update that is bogus, or someone has physical access to your keyboard and hacks it, you are in deep doo-doo.
So, someone could go into a workplace with a laptop, unplug a keyboard, plug it into their laptop and modify it, then plug it back in with nobody the wiser.
Crap.
You do realize this is a hazard to any keyboard that has firmware in it, right? Not just Mac keyboards?
Read the article. The exploit is for all firmware-loading keyboards, including those manufactured by Microsoft and Logitech.
The headline highlights Apple’s wireless keyboard because headlines involving Apple get clicked more: reference the GSM SMS exploit which was demonstrated on a Sony Ericsson phone, yet was reported in the tech media as an iPhone exploit.
Wouldn’t it be just as easy for the user to flash his firmware with the correct version and thus, make sure everything is “okay”?
First you gotta get the malicious firmware revision onto the Mac's keyboard. That means getting the malware on the Mac that will install it on the keyboard and manage the data coming back from the keyboard AND keep it from being seen on the screen... on a Mac, about the only way to do that is with a Trojan. I am not going to be too worried about it.
Note also that this works on ANY computer and Any keyboard with firmware... if it's got firmware, it can be compromised.That would be any keyboard that requires a driver on PCs. Comparing the ease of compromising Macs with malware and compromising Windows XP with malware, I think that would more likely occur on Windows than on Macs.
It also seems like it would not be a problem for software to be made which would read the firmware, compare it to the current version of the firmware and note if there was any differences.
I don’t know, but I seem to recall there is often a problem going backwards with firmware in certain cases, and there has to be a special executable that can specifically undo it, not just running the previous firmware upgrade.
Anyone have knowledge of this?
1. Did you hook up your own keyboard?
2. Has your keyboard every been out of your possession since you hooked it up?
I thought they only needed to fool the user into installing a hacked keyboard firmware update, so no physical access is required.
It's good that the DEFCON BlackHat guys point up vulnerabilities, and I'm very glad they do. And this one is definitely interesting.
But the tech press and their breathless eagerness to pair up the word "Mac" with anything negative in a headline are really quite tiresome.
---------------------------------------------------------
Sent from my Macbook Pro.
Yes. No.
The data the keyboard sends is sent only to the computer it's connected to. To get it any farther, it must be managed by something on the computer that connects to the internet to send the data on to the hacker. The keyboard cannot do that. I know what is running on my computer.
Psychological attack is a method of making the user the agent of the hacker... the agent has to have physical access to install the installer.
There are currently no drive-by installations of software on a Mac without the involvement of someone with administrator access. If that administrator is foolish enough to trust un-trustworthy sites or install files received in email, then no one can protect him from himself.
Congratulations - you are cleared to fly.
; )
I try to be alert, but most of these hacks they've been touting require physical possession of the hardware. If they get the hardware, you're pretty much pwned, no matter what else happens.
Yeah, that's pretty much a "given" in the world of computer security -- no OS is going to stop am attacker who has physical access and enough time.
In this case, of course, the computer itself isn't even compromised -- the keyboard is. And without a subsequent compromise of the computer, the attacker would need physical access a second time to the keyboard to extract the captured data, if I'm reading this correctly.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.