Meet KeySweeper, the $10 USB charger that steals MS keyboard strokes!

on . Posted in Articles of Interest

LAS VEGAS, Nevada (PNN) - January 14, 2015 - It sounds like the stuff of a James Bond flick or something described in documents leaked by former NSA subcontractor Edward Snowden. In fact, this highly stealthy keystroke logger can be built by someone with only slightly above-average technical skills for as little as $10. Called KeySweeper, it's a device disguised as a functioning USB wall charger that sniffs, decrypts, logs, and transmits all input typed into a Microsoft wireless keyboard.

KeySweeper is the brainchild of Samy Kamkar, a hacker who has a track record of devising clever exploits that are off the beaten path. The namesake of the Samy worm that inadvertently knocked MySpace out of commission in 2005, Kamkar has concocted drones that seek out and hack other drones, and devised exploits that use Google Streetview and Google Wi-Fi location data to stalk targets. His hacks underscore the darker side of the connected world that makes it possible for bad guys to monitor our most private communications and everyday comings and goings.

KeySweeper follows the same path. Unveiled on Monday, it provides the software and hardware specifications for building a highly stealthy sniffing device that plucks out every keystroke inputted to a Microsoft wireless keyboard. The device can either log the input on a chip for physical retrieval later, or it can use an optional GSM chip to transmit the keystrokes wirelessly to the attacker. For maximum efficiency, it can be programmed to send the operator SMS messages whenever certain keywords - think "bankofamerica.com," "confidential," or "password" - are entered. The entire sniffing device can be stashed inside an AC USB charger that powers the device. It recharges when plugged in and runs off battery when not connected to a power source. To people being spied on, it looks like just another USB charger plugged into a wall socket.

The guts of the hardware is an Arduino or Teensy microcontroller and an nRF24L01+ radio frequency chip. While the chips are designed to communicate only over proprietary protocols, Kamkar figured out how to modify them to promiscuously sniff Microsoft keyboards by borrowing from previous sniffing attacks. Other optional hardware components include an SPI Serial Flash chip for storing keystrokes, an Adafruti FONA board, A SIM card, and a 3.7V Lithium-Ion battery. Most of the available software runs on the microcontroller, but Kamkar also provides web-based backend apps that remotely log keystrokes and provide a Web interface for live monitoring of targeted keyboards.

The weakness that makes exploits like KeySweeper possible is encryption routines built into Microsoft wireless keyboards that can fairly be described as lackadaisical. Keystrokes are encoded with the XOR algorithm using the keyboard MAC address as the key. Since the nRF24L01+ chip can read the MAC address, the measure provides little security against moderately determined hackers. To make things even easier on attackers, all Microsoft keyboards begin with 0xCD as the MAC. As a result, even if an attacker doesn't know the MAC address, we can decrypt a keystroke, as the alignment will never change, and 0xCD is always the first byte of the MAC.

The inadequate XOR encryption baked into Microsoft wireless keyboards isn't new. The weakness was brought to light a few years ago by previous white hats Travis Goodspeed, Thorsten Schröder, and Max Moser. Those earlier exploits, however, required much larger computers that consumed much more power, making an inexpensive, highly stealthy, and always-on device like KeySweeper infeasible. Kamkar's contribution is applying the previous work to build a sniffer that a janitor, co-worker, or other person can surreptitiously plant within range of a targeted keyboard and then walk away. KeySweeper makes the perfect companion to CreepyDOL, a low-cost DIY tool for stalking mobile Wi-Fi users.

Readers who want to protect themselves against KeySweeper-style attacks should permanently eschew the use of Microsoft wireless keyboards, or at least test their Microsoft wireless keyboard against KeySweeper-style exploits to ensure it's not vulnerable. The keyboard Kamkar tested for his research was a brand new model purchased two weeks ago from a Best Buy store, so there's ample evidence the attack works against at least some Microsoft keyboards. That said, an Ars reader has pointed out this 2011 article reporting the release of a Microsoft keyboard with 128-bit AES encryption. Microsoft's website lists only a single model of keyboard that offers that protection.

Wired keyboards and wireless keyboards based on Bluetooth are immune to this class of attack. That's not to say this latter category of keyboards aren't susceptible to sniffing hacks that monitor electromagnetic radiation and vibrational patterns, but those types of attacks are much more theoretical and much harder to carry out in practice. KeySweeper, by contrast, is ready now.

Microsoft has issued the following statement:

Keyboards from multiple manufacturers are affected by this device. Where Microsoft keyboards are concerned, customers using our Bluetooth-enabled keyboards are protected from this type of attack. In addition, users of our 2.4GHz wireless keyboard designs from July 2011 onwards are also protected because these keyboards use Advance Encryption Standard (AES) technology.

Eulogies

Eulogy for an Angel
1992-Dec. 20, 2005

Freedom
2003-2018

Freedom sm

My Father
1918-2010

brents dad

Dr. Stan Dale
1929-2007

stan dale

MICHAEL BADNARIK
1954-2022

L Neil Smith

A. Solzhenitsyn
1918-2008

solzhenitsyn

Patrick McGoohan
1928-2009

mcgoohan

Joseph A. Stack
1956-2010

Bill Walsh
1931-2007

Walter Cronkite
1916-2009

Eustace Mullins
1923-2010

Paul Harvey
1918-2009

Don Harkins
1963-2009

Joan Veon
1949-2010

David Nolan
1943-2010

Derry Brownfield
1932-2011

Leroy Schweitzer
1938-2011

Vaclav Havel
1936-2011

Andrew Breitbart
1969-2012

Dick Clark
1929-2012

Bob Chapman
1935-2012

Ray Bradbury
1920-2012

Tommy Cryer
1949-2012

Andy Griffith
1926-2012

Phyllis Diller
1917-2012

Larry Dever
1926-2012

Brian J. Chapman
1975-2012

Annette Funnicello
1942-2012

Margaret Thatcher
1925-2012

Richie Havens
1941-2013

Jack McLamb
1944-2014

James Traficant
1941-2014

jim traficant

Dr. Stan Monteith
1929-2014

stan montieth

Leonard Nimoy
1931-2015

Leonard Nimoy

Stan Solomon
1944-2015

Stan Solomon

B. B. King
1926-2015

BB King

Irwin Schiff
1928-2015

Irwin Schiff

DAVID BOWIE
1947-2016

David Bowie

Muhammad Ali
1942-2016

Muhammed Ali

GENE WILDER
1933-2016

gene wilder

phyllis schlafly
1924-2016

phylis schafly

John Glenn
1921-2016

John Glenn

Charles Weisman
1954-2016

Charles Weisman

Carrie Fisher
1956-2016

Carrie Fisher

Debbie Reynolds
1932-2016

Debbie Reynolds

Roger Moore
1917-2017

Roger Moore

Adam West
1928-2017

Adam West

JERRY LEWIS
1926-2017

jerry lewis

HUGH HEFNER
1926-2017

Hugh Hefner

PROF. STEPHEN HAWKING
1942-2018

Hugh Hefner 

ART BELL
1945-2018

Art Bell

DWIGHT CLARK
1947-2018

dwight clark

CARL MILLER
1952-2017

Carl Miller

HARLAN ELLISON
1934-2018

Harlan Ellison

STAN LEE
1922-2018

stan lee

CARL REINER
1922-2020

Carl Reiner

SEAN CONNERY
1930-2020

dwight clark

L. NEIL SMITH
1946-2021

L Neil Smith

JOHN STADTMILLER
1946-2021

L Neil Smith