Computer researcher Marcus Mengs has discovered security flaws that affect wireless keyboards and mice and endanger our data
If you have a wireless mouse or keyboard then be very careful: they could become the front door for viruses or malware and in a few minutes a hacker could use them to enter your PC and steal all your data , as well as destroy them.
The alarm comes from the researcher Marcus Mengs, who explains how the problem lies mainly in some security flaws of the dongle (the small USB key used to send input from mice and keyboards, but also pointers for presentations and other devices). Although the flaw was found on Logitech devices, it would be a generalized alarm, not related to a specific product or brand: Meng did not do specific tests, but also other wireless pointing devices, equipped with the same chip but produced by other brands , they could be vulnerable.
Because wireless mice and keyboards are dangerous
Mengs found that during the pairing phase between the pointing device and the dongle, a hacker could get in the way and enter our system. At that point he could do anything: send us viruses or steal data, for example. The vulnerabilities found by Marcus Meng are a total of seven and not for all there is already a security patch.
The indicted dongles
According to Mengs the vulnerabilities have an impact on all Logitech USB dongles that use the proprietary 2.4 GHz ” Unifying ” radio technology , whose first version dates back to 2009. The dongles are often found with wireless keyboards, mice, clickers for presentations and trackballs.
The 2016 MouseJack
It is not the first time that security flaws are discovered in wireless dongles for pointing devices. Already in 2016 another researcher, Marc Newlin, discovered the vulnerability that then became famous with the name of “MouseJack”. It was a flaw very similar to those discovered by Marcus Meng, a sign that the wireless connection applied to mice and keyboards can be very dangerous. Also because, and this is particularly serious, Mengs has discovered that in the market there are still devices vulnerable to the MouseJack of 2016. And this, as will be understood, multiplies the number of potentially attackable devices.