What is MouseJack?

MouseJack is a class of vulnerabilities that affects the vast majority of wireless, non-Bluetooth keyboards and mice. These peripherals are 'connected' to a host computer using a radio transceiver, commonly a small USB dongle. Since the connection is wireless, and mouse movements and keystrokes are sent over the air, it is possible to compromise a victim's computer by transmitting specially-crafted radio signals using a device which costs as little as $15.


An attacker can launch the attack from up to 100 meters away. The attacker is able to take control of the target computer, without physically being in front of it, and type arbitrary text or send scripted commands. It is therefore possible to perform rapidly malicious activities without being detected.

The MouseJack exploit centers around injecting unencrypted keystrokes into a target computer. Mouse movements are usually sent unencrypted, and keystrokes are often encrypted (to prevent eavesdropping what is being typed). However the MouseJack vulnerability takes advantage of affected receiver dongles, and their associated software, allowing unencrypted keystrokes transmitted by an attacker to be passed on to the computer's operating system as if the victim had legitimately typed them.
 
For more information on the MouseJack vulnerability, you can watch the video, read the MouseJack technical white paper, and view the list of affected devices.

The public advisories can be found here, and have been registered with CERT.

Who is Vulnerable?

Q: I have a Bluetooth keyboard/mouse. Am I vulnerable?

A: Not from MouseJack. Bluetooth uses a completely different transmission and encryption system that is not vulnerable to this attack.

Q: How long does it take to hack my laptop with MouseJack?
 
A: A MouseJack compromise can take place in seconds. Don't think of an attacker needing to use your keyboard/mouse for minutes looking through your interesting emails. In around ten seconds, your computer can be altered to allow an attacker to remotely download documents, all your emails, and add or delete programs.

Q: Why would anyone care about attacking me on my laptop?

A: There are two plausible scenarios:

  1. PERSONAL ATTACK: Identity theft is an increasing problem that can result in a negative credit rating and expensive legal battle to reclaim what is rightfully yours. Criminals are becoming increasing sophisticated in how they piece together the necessary information to pretend to be you.

  2. COMPANY ATTACK: Once your laptop is 'MouseJacked', malicious software can be installed that will remain dormant until you connect to your corporate network. The software will attempt to replicate across the rest of the computers connected to that network, exfiltrating sensitive documents and user credentials - this is modern corporate espionage.


Q: Where is my laptop vulnerable?

A: Your laptop can be 'MouseJacked' from up to 100 metres away. You could be in the office and a visitor hacks you from reception, you could be at home and a hacker attacks you from the street, you could be in a coffee shop and another customer hacks you. The same threat exists at an airport, or on a plane, or in many other situations.

Bottom line: If your computer is turned on, and a vulnerable dongle is attached, it could be vulnerable to MouseJack.