ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    HP Laptops Found with Keylogger Built Into Audio Driver

    Scheduled Pinned Locked Moved News
    hplaptopsecuritykeyloggerbleeping computer
    64 Posts 16 Posters 10.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DustinB3403D
      DustinB3403 @scottalanmiller
      last edited by

      @scottalanmiller said in HP Laptops Found with Keylogger Built Into Audio Driver:

      keylogger.jpg

      That password though. . . I mean come on "football23" no capitals, or special characters. . . Would you even need a keylogger for that?

      travisdh1T 1 Reply Last reply Reply Quote 0
      • S
        scotth
        last edited by

        I have one here.
        I made the log file read only.
        Let's have a little fun.

        momurdaM 1 Reply Last reply Reply Quote 3
        • travisdh1T
          travisdh1 @DustinB3403
          last edited by

          @DustinB3403 said in HP Laptops Found with Keylogger Built Into Audio Driver:

          @scottalanmiller said in HP Laptops Found with Keylogger Built Into Audio Driver:

          keylogger.jpg

          That password though. . . I mean come on "football23" no capitals, or special characters. . . Would you even need a keylogger for that?

          My guess for a single cracking machine (8 video cards for massively parallel compute), about 2 minutes.

          1 Reply Last reply Reply Quote 0
          • DustinB3403D
            DustinB3403
            last edited by

            Yeah I actually just shipped one of these laptops back yesterday!

            Good thing it was only a trial device and we did nothing with it.

            1 Reply Last reply Reply Quote 0
            • momurdaM
              momurda @scotth
              last edited by

              @scotth Is the log file showing all keystrokes before you made it readoly?

              S 1 Reply Last reply Reply Quote 0
              • S
                scotth @momurda
                last edited by

                @momurda No. Zero byte file at this time. I haven't checked alternative streams yet.

                S 1 Reply Last reply Reply Quote 0
                • S
                  scotth @scotth
                  last edited by scotth

                  @scotth said in HP Laptops Found with Keylogger Built Into Audio Driver:

                  @momurda No. Zero byte file at this time. I haven't checked alternative streams yet.

                  Interesting. While attempting to open the file, I get denied access due to another process.

                  Edit: It's currently marked as readonly and hidden.

                  JaredBuschJ 1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch @scotth
                    last edited by

                    @scotth said in HP Laptops Found with Keylogger Built Into Audio Driver:

                    @scotth said in HP Laptops Found with Keylogger Built Into Audio Driver:

                    @momurda No. Zero byte file at this time. I haven't checked alternative streams yet.

                    Interesting. While attempting to open the file, I get denied access due to another process.

                    Edit: It's currently marked as readonly and hidden.

                    The executable will delete it and recreate it though.

                    1 Reply Last reply Reply Quote 0
                    • momurdaM
                      momurda
                      last edited by momurda

                      Math is probably wrong, but
                      football23
                      10 chars password
                      36 possiblities per character space only using lowercase letters and numbers
                      36^10 possibilities roundabout.
                      3,656,158,440,062,976
                      If you do 100MillionHashes/second,
                      365,615,644 seconds or 101,559 hours or 4231 days or 11.5 years

                      But since football is in the dictionary it is likely much easier if your algorithm does dictionary before trying random strings. Either way, it is much easier to do if youre recording keystrokes.

                      @scotth Can you undo the read only bit and reboot that laptop see what happens?

                      DustinB3403D S travisdh1T 3 Replies Last reply Reply Quote 0
                      • DustinB3403D
                        DustinB3403 @momurda
                        last edited by

                        @momurda It would take about a single day for the average computer to brute force that password.

                        anthonyhA 1 Reply Last reply Reply Quote 1
                        • S
                          scotth @momurda
                          last edited by

                          @momurda Not right now. I may play around with it tonight. Comodo has a crazy task manager that I'll run on it tonight

                          1 Reply Last reply Reply Quote 0
                          • travisdh1T
                            travisdh1 @momurda
                            last edited by

                            @momurda said in HP Laptops Found with Keylogger Built Into Audio Driver:

                            But since football is in the dictionary it is likely much easier if your algorithm does dictionary before trying random strings. Either way, it is much easier to do if youre recording keystrokes.

                            Yep, dictionary word = not even bothering with brute forcing.

                            1 Reply Last reply Reply Quote 1
                            • anthonyhA
                              anthonyh @DustinB3403
                              last edited by

                              @DustinB3403 said in HP Laptops Found with Keylogger Built Into Audio Driver:

                              @momurda It would take about a single day for the average computer to brute force that password.

                              What if the authentication back-end implemented a lockout or throttling policy? Like after X attempts the account is locked out and/or authentication responses are delayed by X time?

                              travisdh1T 1 Reply Last reply Reply Quote 0
                              • travisdh1T
                                travisdh1 @anthonyh
                                last edited by

                                @anthonyh said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                @DustinB3403 said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                @momurda It would take about a single day for the average computer to brute force that password.

                                What if the authentication back-end implemented a lockout or throttling policy? Like after X attempts the account is locked out and/or authentication responses are delayed by X time?

                                That's great so long as it's not an offline attack. IE: Do you know who's seen your salt?

                                anthonyhA 1 Reply Last reply Reply Quote 0
                                • anthonyhA
                                  anthonyh @travisdh1
                                  last edited by

                                  @travisdh1 said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                  @anthonyh said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                  @DustinB3403 said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                  @momurda It would take about a single day for the average computer to brute force that password.

                                  What if the authentication back-end implemented a lockout or throttling policy? Like after X attempts the account is locked out and/or authentication responses are delayed by X time?

                                  That's great so long as it's not an offline attack. IE: Do you know who's seen your salt?

                                  That makes sense.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    scotth
                                    last edited by

                                    Last night, I fired up KillSwitch (Comodo Task Manager on Steroids), killed the process - MicTray_64.exe (can't really remember) and the log file was released for editing / viewing.
                                    Sneaky.

                                    1 Reply Last reply Reply Quote 1
                                    • S
                                      scotth
                                      last edited by

                                      https://www.axios.com/hp-says-it-has-a-fix-for-flaw-that-caused-some-pcs-to-log-every-keystr-2403751321.html
                                      Spiceworks - Spark

                                      1 Reply Last reply Reply Quote 1
                                      • KellyK
                                        Kelly
                                        last edited by

                                        So I have a Spectre 360 and it has the MicTray64.exe, associated process, and the logfile in C:\Users\Public\MicTray.log. The log file is zero bytes though and appears to be empty. I'm wondering if it isn't logging, or if the list of affected machines is longer than officially announced.

                                        S 1 Reply Last reply Reply Quote 0
                                        • S
                                          scotth @Kelly
                                          last edited by

                                          @Kelly said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                          So I have a Spectre 360 and it has the MicTray64.exe, associated process, and the logfile in C:\Users\Public\MicTray.log. The log file is zero bytes though and appears to be empty. I'm wondering if it isn't logging, or if the list of affected machines is longer than officially announced.

                                          The driver is Conexant via whomever it's hardware ends up on.

                                          StrongBadS 1 Reply Last reply Reply Quote 0
                                          • StrongBadS
                                            StrongBad @scotth
                                            last edited by

                                            @scotth said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                            @Kelly said in HP Laptops Found with Keylogger Built Into Audio Driver:

                                            So I have a Spectre 360 and it has the MicTray64.exe, associated process, and the logfile in C:\Users\Public\MicTray.log. The log file is zero bytes though and appears to be empty. I'm wondering if it isn't logging, or if the list of affected machines is longer than officially announced.

                                            The driver is Conexant via whomever it's hardware ends up on.

                                            Does that mean that other vendors might have this too? I mean, it might, that we know. But why has only HP been discovered thus far? Is it an HP version of the driver? Is it HP unique hardware?

                                            S 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 2 / 4
                                            • First post
                                              Last post