Skip to main content

Using a wireless mouse or keyboard? They can be hijacked from up to 100 yards away

using a wireless mouse or keyboard they can be hijacked from up to 100 yards away microsoft universal foldable typing angle
Image used with permission by copyright holder
Although wireless peripherals have the potential to de-clutter your desk and untether you from your system, it turns out they also represent a glaring hole in your digital security. Mice, keyboards and other wireless peripherals from a number of hardware manufacturers are vulnerable to a particular hack called MouseJack, which could see your hardware being taken over from up to 100 yards away.

The MouseJack vulnerability stems from the lack of encryption of the wireless signal of most wireless USB hardware as it’s transferred from the peripheral to the wireless base station. It is quite simple to add additional information to alter how a movement is interpreted, or worse still, send commands while a user isn’t there to see it.

The flaw is said to be applicable to many peripherals from Amazon, Dell, Gigabyte, HP, Lenovo, Logitech and Microsoft (as per PCWorld). The reason for their susceptibility to the attack, is that they all utilize the same Nordic Semiconductor chips. Some of those chips support encryption and can therefore implement some sort of patch or fix for it – many are already working on it – but those without chips that can support obfuscation may be forced to leave users in a vulnerable state.

Logitech has already released a fix for its affected devices. Dell believes it is unlikely to be utilized as an attack vector, and does not plan to release a patch at this time.

Fortunately, the attack method isn’t foolproof. Hackers would need to be within that 100 yard radius and also need a direct line of sight to the wireless base station, which is far from ideal in most scenarios. If a wireless antenna is used, however, that range can be extended further, and even pass through walls and windows.

There’s also the matter of knowing what commands to send. Presumably, a potential attacker would need to know what the victim was doing to insert harmful commands. That’s not impossible, but it certainly makes the attack more difficult to execute. MouseJack seems more likely to be used as a means of pranking co-workers than a harmful attack.

But hackers are an ingenious bunch, and often use seemingly minor vulnerabilities to achieve impressive results. We hope most companies take Logitech’s approach, and patch the problem.

Jon Martindale
Jon Martindale is the Evergreen Coordinator for Computing, overseeing a team of writers addressing all the latest how to…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more