Bastille is making news once again.
The company has just unveiled “KeySniffer,” a new vulnerability in millions of low-cost wireless keyboards. KeySniffer allows hackers to eavesdrop and capture every keystroke a victim types in 100 percent clear text from as far as 250 feet away.
To see how a KeySniffer attack is executed, watch this video:
When conducting a KeySniffer attack, hackers can expose and access credit card and bank account information, answers to security questions, network access passwords, company secrets, and other private and sensitive data.
Affected manufactures include Hewlett-Packard, Toshiba, Kensington, Insignia, Radio Shack, Anker, General Electric, and EagleTec. Most, if not all, existing keyboards impacted by KeySniffer cannot be upgraded and will need to be replaced. For a complete list of affected devices and to see if your wireless keyboard is at risk, visit www.KeySniffer.net.
The KeySniffer announcement has been publicized in media outlets around the globe including Forbes, BBC, The Washington Post, Wired, Dark Reading, CNET, Threatpost, SC Magazine, Network World, and dozens of other top-tier publications.
KeySniffer is the latest breakthrough discovery for Bastille, who earlier this year unveiled MouseJack, a vulnerability in wireless mice. The company continues to search for these types of vulnerabilities as part of its mission to completely secure the Enterprise by identifying airborne threats and allowing for a preemptive response.