Free Republic
Browse · Search
General/Chat
Topics · Post Article

Physical access to either the computer or prior possession of the keyboard is required for this exploit to be installed on the keyboard. The paper notes that this exploit is not limited to Mac keyboards but applies to any "smart" PC keyboard that uses firmware, which means most keyboards with more than the basic keys. K Chen used an Apple keyboard because that is what he uses... it could just as easily have been on any PC keyboard with extra functional keys such as Logitech and Microsoft keyboards.

It looks to me as if the hacker has found a way to capture the keyboard buffer and dump it. Not good for any computer user. Getting the data from the computer connected to the hexed keyboard to the hacker who wants the data is another matter entirely. That would require something (like spyware) on the target computer to send it on. Keyboard firmware is not checked by any anti-malware apps that I know of.

1 posted on 08/03/2009 9:16:27 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies ]


To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; aristotleman; ...
Watch out for malicious, hijacked keyboards on Macs... and other computers PING!

Thanks to Leonard210 for the heads up!


Mac Keyboard Hacker Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 08/03/2009 9:20:48 PM PDT by Swordmaker (remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker
Hacker demos persistent Mac keyboard attack

Guess, macs, not unlike obama, aren't nirvana after all.

3 posted on 08/03/2009 9:23:38 PM PDT by the invisib1e hand (The revolution IS being televised.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

neener


4 posted on 08/03/2009 9:24:46 PM PDT by mamelukesabre (Si Vis Pacem Para Bellum (If you want peace prepare for war))
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

So, it sounds as if you somehow get keyboard that has been tampered with, a firmware update that is bogus, or someone has physical access to your keyboard and hacks it, you are in deep doo-doo.

So, someone could go into a workplace with a laptop, unplug a keyboard, plug it into their laptop and modify it, then plug it back in with nobody the wiser.

Crap.


5 posted on 08/03/2009 9:27:04 PM PDT by rlmorel ("The Road to Serfdom" by F.A.Hayek - Read it...today.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

1. Did you hook up your own keyboard?

2. Has your keyboard every been out of your possession since you hooked it up?


12 posted on 08/03/2009 9:40:54 PM PDT by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

I thought they only needed to fool the user into installing a hacked keyboard firmware update, so no physical access is required.


13 posted on 08/03/2009 9:51:42 PM PDT by dr_who
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker; the invisib1e hand; rlmorel
Once again, an attack on a peripheral used with ANY desktop PC or laptop makes the news -- because it was demonstrated on a (GASP! Horrors!) Apple product. If it were demonstrated on a Microsoft or other smart keyboard, it would be a total yawner, right? Sheesh.

It's good that the DEFCON BlackHat guys point up vulnerabilities, and I'm very glad they do. And this one is definitely interesting.

But the tech press and their breathless eagerness to pair up the word "Mac" with anything negative in a headline are really quite tiresome.

14 posted on 08/03/2009 9:53:41 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

21 posted on 08/04/2009 4:01:17 AM PDT by Daffynition ("...... we are about to be czarred and fettered." ~ alterum ictum faciam.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker; visualops

Glad I don’t take the keyboard out of my Macbook and leave it around on a park bench where hackers gather to play chess and share hacks and trojans.


22 posted on 08/04/2009 4:18:50 AM PDT by TheStickman
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

I was wondering about the possibility of this when I got a keyboard firmware update not long after I got my Mac. It’s the first time I’ve ever had a keyboard that needed updating.


23 posted on 08/04/2009 6:24:41 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach; ShadowAce
Physical access to either the computer or prior possession of the keyboard is required for this exploit to be installed on the keyboard. The paper notes that this exploit is not limited to Mac keyboards but applies to any "smart" PC keyboard that uses firmware, which means most keyboards with more than the basic keys. K Chen used an Apple keyboard because that is what he uses... it could just as easily have been on any PC keyboard with extra functional keys such as Logitech and Microsoft keyboards.
I'll keep hammering away on this good old dumb keyboard. :') Thanks Swordmaker.
26 posted on 08/04/2009 8:02:32 AM PDT by SunkenCiv (https://secure.freerepublic.com/donate/__Since Jan 3, 2004__Profile updated Monday, January 12, 2009)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

So basically, one would need to voluntarily download a hacked version of the keyboard’s firmware updater and manually install it, giving full permission to to do it (why would someone do that in the first place?).

The only real prospect for danger would be buying a “used” keyboard from a 3rd party (think eBay). But even then, it would sure be a crap-shoot for the nefarious seller. And even then, they would have to get the keyboard back, or find other access to the buyer’s computer.

How many computer devices from any maker have firmware that, with a hacked updater, couldn’t be jacked for any purpose?


30 posted on 08/04/2009 9:00:11 AM PDT by TheBattman (Pray for our country...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Assuming such an exploit could be mounted on a keyboard, then what? To my eye, the researcher has merely posited that rogue code could maybe somehow be put into a keyboard. And... then? To be an effective keylogger, the keystrokes would have to be recorded and/or transmitted to some remote location. How would that work? Wouldn’t such activity be readily perceived by the OS or firewall? Isn’t keyboard RAM rather limited, reducing the ability of keylogger-infected firmware to store much keyboard activity?

I hope this researcher wasn’t tax-funded.


32 posted on 08/04/2009 5:19:05 PM PDT by RightOnTheLeftCoast (I love my country, but I fear it, for it does not love me.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson