Mousejack Attack Allows Hackers to Wirelessly Control PCs 100m Away

Mousejack Attack Allows Hackers to Wirelessly Control PCs 100m Away


Researchers at Bastille have demonstrated how computers can be hacked by exploiting flaws in wireless keyboard and mouse dongles. The attack, termed as mousejack attack, is made possible with the use of portable devices that are manufactured by big vendors including Lenovo, HP, Amazon, Microsoft and Logitech.

MouseJack is a class of vulnerabilities that affects the vast majority of wireless, non-Bluetooth keyboards and mice. These peripherals are ‘connected’ to a host computer using a radio transceiver, commonly a small USB dongle. Since the connection is wireless, and mouse movements and keystrokes are sent over the air, it is possible to compromise a victim’s computer by transmitting specially-crafted radio signals using a device which costs as little as $15.“, the researchers at Bastille said.

An attacker can launch the mousejack attack from up to 100 meters away. The attacker is able to take control of the target computer, without physically being in front of it, and type arbitrary text or send scripted commands. It is therefore possible to perform rapidly malicious activities without being detected.The MouseJack exploit centers around injecting unencrypted keystrokes into a target computer. Mouse movements are usually sent unencrypted, and keystrokes are often encrypted (to prevent eavesdropping what is being typed). However the MouseJack vulnerability takes advantage of affected receiver dongles, and their associated software, allowing unencrypted keystrokes transmitted by an attacker to be passed on to the computer’s operating system as if the victim had legitimately typed them.



More technical details of the mousejack attack can be found here.