Skip to main content

Using a wireless mouse or keyboard? They can be hijacked from up to 100 yards away

using a wireless mouse or keyboard they can be hijacked from up to 100 yards away microsoft universal foldable typing angle
Image used with permission by copyright holder
Although wireless peripherals have the potential to de-clutter your desk and untether you from your system, it turns out they also represent a glaring hole in your digital security. Mice, keyboards and other wireless peripherals from a number of hardware manufacturers are vulnerable to a particular hack called MouseJack, which could see your hardware being taken over from up to 100 yards away.

The MouseJack vulnerability stems from the lack of encryption of the wireless signal of most wireless USB hardware as it’s transferred from the peripheral to the wireless base station. It is quite simple to add additional information to alter how a movement is interpreted, or worse still, send commands while a user isn’t there to see it.

The flaw is said to be applicable to many peripherals from Amazon, Dell, Gigabyte, HP, Lenovo, Logitech and Microsoft (as per PCWorld). The reason for their susceptibility to the attack, is that they all utilize the same Nordic Semiconductor chips. Some of those chips support encryption and can therefore implement some sort of patch or fix for it – many are already working on it – but those without chips that can support obfuscation may be forced to leave users in a vulnerable state.

Logitech has already released a fix for its affected devices. Dell believes it is unlikely to be utilized as an attack vector, and does not plan to release a patch at this time.

Fortunately, the attack method isn’t foolproof. Hackers would need to be within that 100 yard radius and also need a direct line of sight to the wireless base station, which is far from ideal in most scenarios. If a wireless antenna is used, however, that range can be extended further, and even pass through walls and windows.

There’s also the matter of knowing what commands to send. Presumably, a potential attacker would need to know what the victim was doing to insert harmful commands. That’s not impossible, but it certainly makes the attack more difficult to execute. MouseJack seems more likely to be used as a means of pranking co-workers than a harmful attack.

But hackers are an ingenious bunch, and often use seemingly minor vulnerabilities to achieve impressive results. We hope most companies take Logitech’s approach, and patch the problem.

Editors' Recommendations

Jon Martindale
Jon Martindale is the Evergreen Coordinator for Computing, overseeing a team of writers addressing all the latest how to…
How to do hanging indent on Google Docs
Google Docs in Firefox on a MacBook.

The hanging indent is a classic staple of word processing software. One such platform is Google Docs, which is completely free to start using. Google Docs is packed with all kinds of features and settings, to the point where some of its more basic capabilities are overlooked. Sure, there are plenty of interface elements you may never use, but something as useful as the hanging indent option should receive some kind of limelight.

Read more
How to disable VBS in Windows 11 to improve gaming
Highlighting VBS is disabled in Windows 11.

Windows 11's Virtualization Based Security features have been shown to have some impact on gaming performance — even if it isn't drastic. While you will be putting your system more at risk, if you're looking to min-max your gaming PC's performance, you can always disable it. Just follow the steps below to disable VBS in a few quick clicks.

Plus, later in this guide, we discuss if disabling VBS is really worth it, what you'd be losing if you choose to disable it, and other options for boosting your PCs gaming performance that don't necessarily involve messing with VBS.

Read more
How to do a hanging indent in Microsoft Word
A person typing on a keyboard, connected to a Pixel Tablet.

Microsoft Word is one of the most feature-rich word processing tools gifted to us human beings. In fact, the very word “Word” has invaded nomenclature to the point where any discussion of this type of software, regardless of what the product is actually called, typically results in at least one person calling the software “Word.”

Read more