.-.-.-.-.-.-.-.-.-.-.-.
The £6 'spy box' that tracks EVERYTHING you type: Hacker creates a USB charger that can steal banking details remotely
KeySweeper device was created by security researcher Samy Kamkar
The covert device looks, and works, like a typical USB wall charger
It ‘sniffs’ and logs keystrokes made on nearby wireless keyboards
Device sends these decrypted, logged keystrokes to a hacker remotely
It can even alert a hacker by text message if a certain combination of keys is typed, such as web address for online banking or a credit card number
By VICTORIA WOOLLASTON
PUBLISHED: 17:15 GMT, 14 January 2015 | UPDATED: 21:54 GMT, 14 January 2015
For just £6, a hacker can create a covert device that tracks everything you type on a keyboard including usernames, credit card details and banking passwords.The device, called KeySweeper, was built by a Poland-based security researcher and works with a range of wireless keyboards.
Once connected, the small USB wall charger remotely decrypts, logs and sends keystrokes to a hacker using specially designed software. The device, known as KeySweeper, looks and works like a typical USB wall charger (pictured), but uses a built-in chip to ‘sniff’ for keystrokes typed onto nearby wireless keyboards. All of these strokes are then decrypted, logged and sent to a hacker over the web
The device, known as KeySweeper, looks and works like a typical USB wall charger (pictured), but uses a built-in chip to ‘sniff’ for keystrokes typed onto nearby wireless keyboards. All of these strokes are then decrypted, logged and sent to a hacker over the web
KeySweeper was built by hardware hacker Samy Kamkar using an Arduino board, USB charger and Microsoft wireless keyboard.These keyboards use a specific chip that runs on a frequency known as 2.4GHz RF protocol, which is how the communicate wirelessly.As keystrokes are typed on wireless keyboards, they are typically encrypted as they move from the keyboard to computer.By determining which chip a keyboard uses, Mr Kamkar can figure out how to decrypt these keys.
HOW KEYSWEEPER WORKS
Once set up, the charger is plugged into the wall and ‘sniffs’, or ‘listens’ to all the keys the user types.These keys are decrypted, logged and sent back to a hacker over the web, remotely, using Mr Kamkar’s KeySweeper software.The technology can be configured to record everything, and even send a text to the hacker if a certain combination of keys is pressed.Once set up, the charger is plugged into the wall and ‘sniffs’, or ‘listens’ to all the keys the user types.These keys are decrypted, logged and sent back to a hacker over the web, remotely, using Mr Kamkar’s KeySweeper software.
The technology can be configured to record everything, and even send a text alert to the hacker if a certain combination of keys is pressed.For example, if the user types the URL for an online banking site, or enters a 16-digit number, which suggests it could be a credit card number.And even if KeySweeper is unplugged, an internal battery will keep it running - although the battery life depends on the battery used.The range of the KeySweeper is said to be on par with a standard Bluetooth device, at around 32ft (10 metres).
Mr Kamkar used Microsoft keyboards, in particular, because they use the same protocol encryption, meaning once he had decrypted one, he could decrypt others.In theory though, this process could be applied to any wireless keyboard.Mr Kamkar has released the source code and instructions for building a KeySweeper, but advises against people doing so without an electrical background.
Last year, Israeli researchers created keylogging software that can steal keystrokes from computers even when they're not connected to the web, using so-called 'air gaps.'
The logged, decrypted keystrokes are sent to a hacker remotely using the KeySweeper software (pictured). The technology can be configured to record everything, and even send a text alert to the hacker if a certain combination of keys is pressed, such as the web address for online banking or a credit card number
The logged, decrypted keystrokes are sent to a hacker remotely using the KeySweeper software (pictured). The technology can be configured to record everything, and even send a text alert to the hacker if a certain combination of keys is pressed, such as the web address for online banking or a credit card number
Samy Kamkar (pictured bottom right) has released instructions (video grab pictured) for building a KeySweeper, but advises against people doing so without an electrical background. Mr Kamkar used Microsoft keyboards (pictured top) as an example because they use the same protocol and encryption
Samy Kamkar (pictured bottom right) has released instructions (video grab pictured) for building a KeySweeper, but advises against people doing so without an electrical background. Mr Kamkar used Microsoft keyboards (pictured top) as an example because they use the same protocol and encryption
An air-gap or air wall is a network security measure.It was designed to make sure secure computer networks are physically isolated from unsecured networks, such as the internet or a local area network.
The researchers from Israel designed computer software that logs keystrokes, and this software transmits these strokes via FM radio signals generated by the computer's graphics card.
The data is picked up by a nearby mobile, equipped to pick up radio signals.
In the example case, the researchers used a Samsung Galaxy S4 and had to plug in the headphones to get the radio receiver to work.This can be done without being detected by the user, but does rely on the software being installed on the computer in the first place.Since FM radio signals can travel over long distances, the receiver could be placed in another building.
http://www.dailymail.co.uk/sciencetech/article-2910183/The-6-spy-box-tracks-type-Hacker-creates-USB-charger-steal-banking-details-remotely.html
.-.-.-.-.-.-.-.
A totally new energy supply technology for mobile electronic devices. Efficient and remains independent from the power grid.
kraftwerk opens up a whole new dimension in freedom and independence when it comes to supplying your mobile electronic devices with energy. Why? Because kraftwerk enables you to generate your own energy using a small, handy device – in such large amounts that you can run your iPhone, tablet, or even your GoPro camera for weeks!
kraftwerk is your very own portable power plant:
Amazingly small and highly efficient
Totally independent of any power grid or wall outlet
Supplies power reliably – anywhere and at any time
New and pioneering fuel cell technology
An invaluable advantage both in everyday life and even when traveling to the ends of the earth
https://www.kickstarter.com/projects/265641170/kraftwerk-highly-innovative-portable-power-plant
Get more information: http://hellokraftwerk.com/
No hay comentarios:
Publicar un comentario