Office

Jackit: how mice become Trojans

Table of contents:

Anonim

Computer security is routinely at risk. More and more ways are being sought in which to attack users. Today is the turn of a new way. This is JackIt, an exploit that uses the technique of mouse kidnapping or Mousejack.

JackIt: How mice become Trojans

Mousejack is a set of vulnerabilities that affects mice and other wireless devices. Through specific software, it can allow the attacker to take control of a wireless keyboard or mouse remotely. And JackIt is a specific exploit created to take advantage of these Mousejack vulnerabilities.

Kidnapping of mice or wireless devices

This exploit has served to show that there are a huge number of wireless devices that are vulnerable to this type of attack. Virtually any brand from Microsoft to Logitech is. Furthermore, these types of attacks affect both Windows and macOS. At the moment it seems that Linux is the only one that is saved.

Also, carrying out such attacks with an exploit like JackIt is not that complicated. It is enough to have a USB device that costs $ 30 and download specific software that is available online. So users with some skill could carry out these attacks without too many complications.

For users, it is recommended that they have the latest filmware update for their mice updated. In this way they can be protected. Also, the use of moments or keyboards that connect through more secure methods such as Bluetooth is recommended to avoid these attacks. For Windows users, a security patch has been available since last year.

Office

Editor's choice

Back to top button