Post by account_disabled on Mar 6, 2024 5:44:51 GMT 1
According to one of the authors of the security study Marc Newlin, it is possible to launch such an attack with equipment for less than US dollars, . about crowns. And with fifteen lines of code. MouseJack appears to affect a huge number of mice from many manufacturers - out of seventeen tested, only two resisted the attack. It lost to devices from renowned manufacturers such as Logitech, Lenovo, Amazon or Microsoft. The researchers have already published a list of affected peripherals on their website , but according to them, it cannot be understood as complete in any case.
This is just a list of MouseJack-vulnerable peripherals from USA Phone Number List those they've tested - they say it's unrealistic to try all the mice out of the huge number on the market. As is usual with security experts, people from the Bastille security company first consulted with the manufacturers of the affected mice and keyboards to discover the bugs. And that was several months before the public unveiling of MouseJack. Some companies have released security patches for firmware during that time, which should prevent the attack.
However, according to researchers, even be repaired at all. Peripheral manufacturers try to play down the severity of the discovery a little - for example, according to one of Logitech's technical directors Asif Ahsan, the researchers discovered the security hole in a controlled, experimental environment. “The weakness would be complex to replicate and would require physical proximity to the device,” Ahsan argued. MouseJack is really limited in range. According to experts, it is thus possible to take possession of someone else's computer at a maximum distance of one hundred yards.
This is just a list of MouseJack-vulnerable peripherals from USA Phone Number List those they've tested - they say it's unrealistic to try all the mice out of the huge number on the market. As is usual with security experts, people from the Bastille security company first consulted with the manufacturers of the affected mice and keyboards to discover the bugs. And that was several months before the public unveiling of MouseJack. Some companies have released security patches for firmware during that time, which should prevent the attack.
However, according to researchers, even be repaired at all. Peripheral manufacturers try to play down the severity of the discovery a little - for example, according to one of Logitech's technical directors Asif Ahsan, the researchers discovered the security hole in a controlled, experimental environment. “The weakness would be complex to replicate and would require physical proximity to the device,” Ahsan argued. MouseJack is really limited in range. According to experts, it is thus possible to take possession of someone else's computer at a maximum distance of one hundred yards.