MouseJack, originally discovered by Bastille, is a vulnerability that affects many wireless (non-Bluetooth) keyboards and mice. An attacker is able to utilize a USB radio device, available for less than 34 dollars, to perform the attack. With this device, an attacker can send commands to a target’s vulnerable USB dongle, allowing the attacker to compromise logged in user sessions.
In this blog post, White Oak Security will demonstrate the configuration and execution of the MouseJack attack. We will be utilizing a Logitech M325 mouse for demonstration purposes.
git clone https://github.com/insecurityofthings/jackit.git
cd jackit
pip install -e .
Now that we have the requirements to run the toolset, let’s create a file of commands that will be executed on the victim’s workstation.
Example File Contents: (windows-demo.txt)
GUI r
DELAY 500
STRING notepad.exe
ENTER
DELAY 1000
STRING You are using a vulnerable wireless device!
./jackit --script windows-demo.txt
Screenshot of jackit running:
Jackit has identified a vulnerable wireless device. Press “ctrl-c” on your keyboard to continue to perform the script injection process. After issuing “ctrl-c”, the user is prompted to select a target key identifier to attack or attack all discovered devices. In this example we selected target Key identifier “1”.
Switching over to the victim’s workstation – we can see the script successfully executed from the screenshot below:
To demonstrate the severity of this issue, White Oak Security have created a video of this attack in action:
It has been determined that some other manufactures (Dell, Amazon, etc.) have vulnerable devices as well without releasing an update to address this specific issue. This situation has companies reviewing internal BYOD (Bring Your Own Device) policies to provide guidance to employees. Ultimately switching to wired keyboards and mice would be the best solution, if viable to the company.Find Out More About White Oak