The $30 device that can hack into nearby keyboards
Loading...
Attention, Microsoft keyboard users: There is now聽, VentureBeat reports.
Built by security researcher聽Samy Kamkar,聽, can sniff, decrypt, log, and report the keystroke activity present as a wireless keyboard communicates with a PC, according to Mr. Kamkar鈥檚 site. All information is saved locally and online, and KeySweeper can even send text messages based on trigger words, usernames, or URLs. An internal rechargeable battery allows the device to operate even when unplugged.
Kamkar estimates a KeySweeper device to cost between $10 and $30 to build. The covert device should work with most,聽if not all, Microsoft wireless keyboards.
鈥淲e are aware of reports about a 鈥楰eySweeper鈥 device and are investigating,鈥 a Microsoft spokesperson told VentureBeat.
The development of the device comes in the wake of President Obama's聽call for聽. In the US, about of online adults say they have had information such as credit card and bank account numbers stolen, according to the Pew Research Center.
KeySweeper, a , represents a type of device that has been the source of compromised security for a slew of companies over the years.聽In 2011, for instance, Texas-based marketing giant Epsilon reported having聽, affecting clients such as JPMorgan, Citigroup, and Best Buy. In 2013, hackers using keylogger malware聽聽from sites such as Facebook, Google, Yahoo, and Twitter, CNN reported.
However, keyloggers can legally be used for things like parental controls and company security, allowing parents or employers to track what their children or employees are doing online.
For his part, Kamkar has spent years researching and revealing weaknesses in mobile and wireless security. In 2008, he displayed how RFID (radio-frequency identification) technology in badges and credit cards could be exploited for identity theft.
鈥淯sing my firmware, you can actually just walk around without a laptop, with just this credit card-sized Proxmark device, have a little antenna about the size of a credit card, it could be in your sleeve, or it could be in your pocket, and just walk around in Times Square and you'll just start picking up people's IDs,鈥 Kamkar , CTO of Contrast Security and host of The Security Influencers Channel on iTunes, in September.
In 2011, Kamkar discovered that Android, iPhone, and Windows Mobile devices . His findings led to that looked into Apple鈥檚 and Google鈥檚 privacy policies and practices.
Kamkar is also the man behind , a virus that, if so employed, had the ability to steal user data and that allowed Kamkar, then 19, to make more than 1 million MySpace friends in less than a day.
He also developed the , a program that continues to identify users even after they delete standard cookies from their browsers; and the , a drone that seeks out, hacks, and takes charge of other drones within wireless distance, 鈥渃reating an army of zombie drones under your control.鈥