{"id":1713,"date":"2011-02-14T12:13:34","date_gmt":"2011-02-14T20:13:34","guid":{"rendered":"http:\/\/blog.cosaint.net\/?p=1713"},"modified":"2023-03-01T16:53:24","modified_gmt":"2023-03-01T16:53:24","slug":"sometimes-hackers-use-hardware","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/sometimes-hackers-use-hardware\/","title":{"rendered":"Sometimes Hackers Use Hardware"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-1724\" title=\"keylogger\" src=\"https:\/\/www.empowerbpo.com\/blog\/wp-content\/uploads\/2011\/02\/keylogger.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2011\/02\/keylogger.jpg 150w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2011\/02\/keylogger-100x100.jpg 100w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Hackers don&#8217;t always try to break into computer systems through the Internet, or by using malicious software (malware) in email attachments. If they can gain physical access to computers, there&#8217;s often a simpler way.<\/p>\n<p>Several public libraries in the UK have reported finding keyloggers attached to the back of PCs. These devices, which look a lot like normal USB flash drives, monitor the keystrokes &#8211; including usernames and passwords &#8211; of all users of the PCs. So, if you used one of these PCs to access your bank account, your Facebook profile, or your email, your identity might have been compromised.<\/p>\n<p>Hardware keyloggers are very small and, unless you look carefully at the back of the computer &#8211; and know exactly what you&#8217;re looking for &#8211; they can be almost impossible to detect. Here&#8217;s an example:<\/p>\n<p><!--more--><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1717\" title=\"keylogger_large\" src=\"https:\/\/www.empowerbpo.com\/blog\/wp-content\/uploads\/2011\/02\/keylogger_large.jpg\" alt=\"\" width=\"319\" height=\"332\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2011\/02\/keylogger_large.jpg 319w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2011\/02\/keylogger_large-288x300.jpg 288w\" sizes=\"(max-width: 319px) 100vw, 319px\" \/><\/p>\n<p>As well as being difficult to spot, they&#8217;re also relatively cheap (&lt;$100) making them ideal for aspiring criminals.<\/p>\n<p>One of the most dangerous (and unrecognized) aspects of hardware keyloggers is that SSL (Secure Sockets Layer) encryption is bypassed &#8211; the keyboard entries are intercepted <strong>before they&#8217;re encrypted<\/strong>. So looking for the lock icon on your bank website isn&#8217;t going to help you.<\/p>\n<p>What does this mean for your security awareness training? Even if your offices are locked down and a hacker couldn&#8217;t gain access to install a hardware keylogger, you should still be concerned. If your staff are using the same password for their Hotmail account as for your corporate email system, or if they&#8217;re accessing your corporate systems from a public computer, you could be in trouble. This is a topic that you do need to cover &#8211; perhaps as one of your monthly security reminder emails.<\/p>\n<p>You can read more in this post on the Sophos blog: <a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/02\/14\/hardware-keyloggers-discovered-public-libraries\/\" target=\"_blank\" rel=\"noopener nofollow\">Hardware keyloggers discovered at public libraries<\/a>; and in this report from the Macclesfield Express: <a href=\"https:\/\/www.macclesfield-express.co.uk\/news\/local-news\/cyber-crime-alert-after-bugs-found-2528727\" target=\"_blank\" rel=\"noopener nofollow\">Cyber-crime alert after &#8216;bugs&#8217; found in library computers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers don&#8217;t always try to break into computer systems through the Internet, or by using malicious software (malware) in email attachments. If they can gain physical access to computers, there&#8217;s often a simpler way. Several public libraries in the UK have reported finding keyloggers attached to the back of PCs. These devices, which look a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1713","post","type-post","status-publish","format-standard","hentry","category-infosec"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/1713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=1713"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/1713\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=1713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=1713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=1713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}