Researchers say that small devices called “JitterBugs” could piggyback onto network connections to discreetly send passwords and other sensitive data over the Internet. Like the current keylogger hardware used by the FBI and criminals alike to record passwords and other data, JitterBugs are small devices that attach to a keyboard and record what users type. Unlike current keyloggers, which store the data to internal memory, JitterBugs do not have to be retrieved before captured data can be read. Although no such device has been found “in the wild” yet, researchers have developed a working prototype, and they postulate that similar ideas may have already been used in unnoticed attacks. In a paper titled Keyboards and Covert Channels, University of Pennsylvania grad students explain that the device could encode data in keystrokes by introducing an extra delay between when a key is pressed and when the keyboard tells the computer that the key has been pressed. In applications such as telnet and remote desktop, a packet is sent every time a user presses a key. By causing calculated “jitters” in keyboard input while such a program is running, a JitterBug could slightly delay data sent over the network. Certain amounts of delay could represent a one or a zero in each packet that is linked to keyboard use, allowing an attacker to send secret information in otherwise innocuous data without modifying software or initiating any new connections. Although one bit per packet is not a great deal of space, an application like telnet could send enough packets to transmit a password or another small, important piece of data. To intercept this data, a spy would need to use a packet sniffer to intercept a connection from the target computer. This would require that the attacker have access to a network somewhere between the victim and the victim’s destination – not a trivial goal, but probably easier than attaching the JitterBug in the first place. Even if the connection is encrypted, data encoded in the delays would likely be visible to an attacker. Although additional delays could ruin the careful pattern introduced by the JitterBug, the device has some level of tolerance for this issue. Researchers say that in tests, the JitterBug was able to transmit data from the University of Pennsylvania to the National University of Singapore fairly reliably. Researchers believe that such devices could pose a security threat not only because they are difficult to detect and work across a wide variety of software and hardware but also because they could be inconspicuously deployed on a large scale. In what the paper’s authors term a “supply chain attack,” manufacturers would build a JitterBug into their keyboards. Such a vulnerability would be extremely difficult to detect – neither the keyboard nor the victim’s computer would appear to be doing anything unusual – but anyone who knew of the devices could decode the data they sent, getting backdoor access to thousands of computers. This threat, however far-fetched, seems particularly relevant in light of the U.S. government’s decision in May to use computers built by Lenovo only for processing unclassified data. The Chinese government owns 28% of Lenovo, information that has sparked fears of espionage. As it turns out, numerous keyboards are also manufactured in China. To be sure, JitterBugs are a purely theoretical threat as far as anyone can tell, and intercepting the data they send is not a trivial matter. Still, they could be much easier to deploy and read than today’s keyloggers – and those have been, and probably still are, used for spying. Ryan DeBeasi, rdebeasi@nww.com. Related content news analysis iPhone 8 Rumor Rollup: Cranking up the processors; 3D cameras; $1K-plus price With iPhone 8 A11 processors reportedly in production, the next great Apple smartphone is starting to feel more real By Bob Brown May 14, 2017 3 mins Small and Medium Business Smartphones Apple news analysis SNL one step ahead of Amazon with Echo Silver In SNL spoof, Amazon and AARP team to address senior citizens' most pressing digital assistant needs By Bob Brown May 14, 2017 1 min Small and Medium Business Amazon.com Collaboration Software news analysis You really should know what the Andrew File System is "Model of storing data in cloud and delivering parts of it via on-demand caching at the edge is something everyone takes for granted today," one AFS creator says By Bob Brown May 10, 2017 7 mins IT Training Open Source Servers news analysis Getting a jump on private LTE networks Federated Wireless, Lemko join forces on CBRS wireless networks for private LTE By Bob Brown May 08, 2017 3 mins Small and Medium Business Internet of Things Mobile Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe