Apple Keyboards Vulnerable to Firmware Hack
Almost everything has a processor and/or memory chips these days, including keyboards. Apple's keyboards are no exception; they have 8Kb of flash memory, and 256 bytes of RAM. K. Chen has found a way to very easily install keyloggers and other possibly malicious code right inside these Apple keyboards (more here). Proof of concept code is here as well.
While 8Kb of flash memory and 256 bytes of RAM might not sound like a whole lot of space, it's enough for an intelligent coder to make use of, and for someone with malicious intent to abuse. K. Chen presented his findings at this year's Black Hat conference.
It's actually quite easy to abuse the memory and RAM in Apple keyboards, thanks to Apple's HIDFirmwareUpdaterTool, which is used to update the firmware in HID devices, among which is the Apple keyboard. "The tool is run, a breakpoint set, and then you simply cut and paste the new code into the firmware image in memory. That's it," SemiAccurate explains. Nothing is encrypted, decrypted, and it's all very simple to do. Resume the HIDFirmwareUpdaterTool, and a few seconds later, your keyboard is compromised. Rebooting won't help, you can't pull any batteries, and it's impossible to detect.
