Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Snapchat Symbol Meaning

We may earn commissions when you buy from links on our site. Why you can trust us.

author photo

Keyloggers Posing as Chargers Steal Wireless Data

by Elmer Montejo on May 25, 2016


Wireless keyboards and mice are the new way in to your data for hackers and scammers. A few months ago, researchers found that more than one billion mice and keyboards were vulnerable to hacking through their wireless transmitters. And, the latest trend: devices designed look like USB phone chargers that sniff passwords and text that you type into wireless keyboards.

Last month, the FBI sent out a warning to businesses about the vulnerability of wireless devices in offices. The culprit is a harmless-looking device known as the KeySweeper, a $10 device that masquerades as a USB phone charger but actually logs and decrypts keystrokes from older wireless Microsoft keyboards and devices. 

Imagine if a device like the KeySweeper were plugged into an outlet in Starbucks or smuggled into your office and plugged in near the workstations. Anyone using a wireless device would be wide open for data harvesting — passwords, personally identifiable information, trade secrets, intellectual property, sensitive information or anything typed into a wireless keyboard. Because the theft happens over the air long before your keystrokes reach your computer, “security managers may not have insight into how sensitive information is being stolen,” warned the FBI advisory.

The KeySweeper can intercept radio frequency signals from some Microsoft wireless keyboards made before 2011. Many of these are still available in stores. Microsoft maintains that KeySweeper can’t attack its Bluetooth-enabled keyboards. And its 2.4-gigahertz wireless keyboards released after 2011 are immune because they use Advanced Encryption Standard (AES) encryption technology.

Hiding behind hardware from another company might not be the safety net you'd hoped. The FBI advisory suggests that similar devices could be programmed to exploit non-Microsoft wireless keyboards and devices.

The KeySweeper uses a Subscriber Identity Module (SIM) to send harvested data to web servers over a cellular connection. It can forward text containing flagged keywords such as URLs to a mobile device via SMS. The device even includes a flash memory module to store data in case SMS functionality is unavailable and a rechargeable battery for backup power.

The best way to avoid this hardware vulnerability is to avoid using wireless input devices in offices and other places accessible by many people. Instead, use wired devices, or use newer devices with AES encryption or Bluetooth with encryption and a strong PIN. The FBI recommends restricting the use of mobile chargers that look like the KeySweeper in offices.

Replace your old keyboard and mouse 

When you're using a wireless keyboard and mouse on the go, you'll want the best combination of usability and portability. Here are our picks to replace your data-leaking devices.

Logitech K480 keyboard

For a keyboard, we like the Logitech K480 Multi-Device Bluetooth Keyboard ($36.79 on Amazon). Not only does it works with Windows tablets (and Macs), it also can pair with your Android and iOS devices, Apple TV (2nd and 3rd generation) and any other device that supports Bluetooth keyboards. And it can be paired with up to three devices at a time. When you move between devices, just turn the device dial to switch. The K480 is a full-size keyboard and has nicely spaced chicklet-style keys for easy typing. It comes in black or white and features a handy slot to hold your tablet. 

Logitech MX Anywhere 2 mouseIf you're looking for new mouse, we like the Logitech MX Anywhere 2 mouse ($59.99 on Amazon). In addition to Bluetooth, the MX Anywhere 2 comes with a tiny RF receiver that you can plug into your PC or Mac laptop. The mouse can pair with up to three devices and switching between them is a simple matter of touching a button. The mouse uses Logitech's Dark Field Laser sensor, which offers great tracking on any surface, even high gloss surfaces. The mouse's rechargeable battery lasts up to two months between charges

[Image credit: FBI Cyber Division, Logitech]


Privacy, News, Computers and Software, Computers & Accessories, Computer Safety & Support, Phone Accessories, Blog

Discussion loading


From Zigy on June 03, 2016 :: 5:20 am

Hi, I looked at both devices specs at Amazon, it’s nothing mentioned about security or encriptions against hackers and scammers



From Kenneth on April 19, 2017 :: 8:08 am

Even a encrypted Bluetooth isn’t safe. The attacker can figure out the encryption because most all manufacturers use set codes. Making software to figure the encryption is east. Go to a USB its safer.


Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships | Licensing & Permissions
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.