The concept of manipulating and compromising wireless devices is nothing new. Most wireless attacks that are conducted today are geared toward specific devices, such as wireless access points and routers that have wireless capabilities. However, there are also other wireless devices, such as mice and keyboards, that have attack vectors.
While wireless devices are certainly a potential attack vector, it is important to be cognizant of all of your wireless risk, not just that used for your network connectivity. One example of such risk is an aptly named exploit called Mousejack (CERT VU#981271). Released in early 2016, Mousejack is a collection of peripheral vulnerabilities that permit an attacker to manipulate communication between a wireless device and the receiver. An attacker can sit within approximately 100 meters of a vulnerable wireless device, such as a wireless keyboard, and inject keystrokes into the transmission. From a victim’s standpoint, it appears that their computer is typing on its own, and, before the user knows it, the payload has been executed. An attack that is both quick and able to be conducted from 100 meters away is unsettling for security administrators.
Although Mousejack is an older vulnerability, many users still have wireless mice or keyboards from years ago. These types of devices often get handed down among users and are rarely updated. One of the main problems with older wireless devices is their lack of encryption on the transmission between the devices, which essentially lets an attacker emulate typing on the victim’s keyboard by injecting packets into the unencrypted communication.
Mouse and Keyboard Attack Setup and Demonstration
The Mousejack attack requires:
A long-range open USB radio (e.g., Crazyradio PA);
Fortunately, as Mousejack is well documented, there is already prebuilt application code and firmware we can use to avoid having to write our code own based on the technical specifications.
We will be using a Crazyradio PA USB dongle as the long-range open USB radio.
This device is not only capable of interacting with radio frequency traffic on the 2.4 GHz ISM band, but also known to work with the Mousejack firmware and the toolkit necessary to launch the injection attack.
The JackIt toolkit is a set of scripts used to orchestrate the attack that leverages a simplistic payload language called Ducky Script. The Ducky Script payload language is essentially a sequence of keystrokes that will be executed once a vulnerable target is identified by the scripts within the JackIt toolkit. Once the Ducky Script payload is injected into the wireless communication, the victim’s computer believes the keystrokes to be coming from the victim’s keyboard and executes whatever commands are sent.
At a high level, taking the following steps is all that an attacker needs to do to execute a mouse and keyboard attack:
For reference, the devices affected by the Mousejack exploit include:
AmazonBasics MG-0975 Wireless Mouse
Dell KM636 Wireless Mouse and Keyboard
Logitech K270 Wireless Keyboard
Logitech K320 Wireless Keyboard
Logitech K750 Wireless Keyboard
Logitech K830 Illuminated Wireless Keyboard
Logitech Marathon M705 Mouse
Logitech Wave M510 Mouse
Logitech Wireless Gaming Mouse G700s
Logitech Wireless M325 Mouse
Logitech Wireless Touch Keyboard K400r
Microsoft All-In-One Media Keyboard
Microsoft Sculpt Ergonomic Mouse
Microsoft Wireless Keyboard 800 (including keystroke logging)
Microsoft Wireless Mobile Mouse 3500
Microsoft Wireless Mouse 1000
Remediation
To address the vulnerabilities associated with the Mousejack exploit, your organization can use wired mice and keyboards and upgrade firmware to a known unaffected version (some versions are not fixable).
Should your organization have any questions about how to better protect wireless devices, whether it be routers, mice, or anything in between, please feel free to reach out to our IT solutions and cybersecurity team.
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.
About the Author
Matt Sheimo
Matt is a Senior Consultant on the Sikich Cybersecurity group’s penetration testing team. He has spent the past 10 years honing his security skills, whether it was while working as a systems and network administrator or performing penetration testing.
In addition to having a Master of Science degree in Cyber Security, Matt is a certified Offensive Security Certified Professional (OSCP) and Certified Information Systems Security Professional (CISSP). He enjoys conducting security research and mentoring students new to the security field.
Sign up for Insights
Join 14,000+ Business executives and decision makers.
Latest Insights
Office 365
Why Upgrading to Microsoft 365 is Essential for Modern Busin...
April 11, 2025
Office 365
Why Upgrading to Microsoft 365 is Essential for Modern Busin...
April 11, 2025
Upgrading from an on-premises Exchange server to Microsoft 365 is a significant decision that can bring numerous benefits to your organization. Here ...
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Customizations: Managing the Human Element in Production Pla...
April 10, 2025
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Customizations: Managing the Human Element in Production Pla...
April 10, 2025
Manufacturers pride themselves on efficiency: optimized workflows, predictable lead times, and streamlined production processes. But when customizati...
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Preventive Maintenance in Dynamics 365
April 9, 2025
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Preventive Maintenance in Dynamics 365
April 9, 2025
For any business, ensuring the efficiency of systems is crucial for maintaining seamless operations. For equipment maintenance professionals, managin...
Leveraging Technology for Compliance and Risk Management in ...
April 9, 2025
Security
Leveraging Technology for Compliance and Risk Management in ...
April 9, 2025
In the logistics industry, compliance and risk management are critical for maintaining operational efficiency, ensuring regulatory adherence, and pro...
Navigating Compliance and Risk Management in Legal & CPA...
April 8, 2025
Security
Navigating Compliance and Risk Management in Legal & CPA...
April 8, 2025
Legal and CPA firms face unique compliance and risk management challenges. This article explores these challenges and offers strategies to ensure com...
Validation Beyond Just Meeting FDA Requirements is Crucial
April 7, 2025
Life Science
Validation Beyond Just Meeting FDA Requirements is Crucial
April 7, 2025
The landscape of the life sciences industry is constantly evolving, and with it, the regulatory oversights. Recent layoffs might have impacted some o...
Microsoft Entra ID P1 vs. P2 Licensing: Understanding the Di...
April 4, 2025
Technology
Microsoft Entra ID P1 vs. P2 Licensing: Understanding the Di...
April 4, 2025
Managing digital identities and access is crucial for any organization. Microsoft Entra ID, formerly known as Azure Active Directory, offers two prim...
A Guide to NetSuite’s Intercompany Automation Across Diffe...
April 2, 2025
NetSuite
A Guide to NetSuite’s Intercompany Automation Across Diffe...
April 2, 2025
Businesses face challenges when managing intercompany transactions across their subsidiaries, becoming increasingly difficult when multiple currencie...
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.