They’ve been aptly nicknamed ‘JitterBugs’. They are tiny devices that attach to a keyboard and record what users type, and piggyback onto network connections to discreetly send passwords and other sensitive data over the Internet.
Like the current keylogger hardware used by the FBI and criminals alike to record passwords and other data, JitterBugs are small devices that attach to a keyboard and record what users type. Unlike current keyloggers, which store the data to internal memory, JitterBugs do not have to be retrieved before captured data can be read.
Although no such device has been found “in the wild” yet, researchers have developed a working prototype, and they postulate that similar ideas may have already been used in unnoticed attacks.
In a paper titled “Keyboards and Covert Channels,” University of Pennsylvania grad students explain that the device could encode data in keystrokes by introducing an extra delay between when a key is pressed and when the keyboard tells the computer that the key has been pressed.
In applications such as telnet and remote desktop, a packet is sent every time a user presses a key. By causing calculated “jitters” in keyboard input while such a program is running, a JitterBug could slightly delay data sent over the network. Certain amounts of delay could represent a one or a zero in each packet that is linked to keyboard use, allowing an attacker to send secret information in otherwise innocuous data without modifying software or initiating any new connections.
Although one bit per packet is not a great deal of space, an application like telnet could send enough packets to transmit a password or another small, important piece of data.
To intercept this data, a spy would need to use a packet sniffer to intercept a connection from the target computer. This would require that the attacker have access to a network somewhere between the victim and the victim’s destination — not a trivial goal, but probably easier than attaching the JitterBug in the first place.
Even if the connection is encrypted, data encoded in the delays would likely be visible to an attacker. Although additional delays could ruin the careful pattern introduced by the JitterBug, the device has some level of tolerance for this issue.
Researchers say that in tests, the JitterBug was able to transmit data from the University of Pennsylvania to the National University of Singapore fairly reliably.
Researchers believe that such devices could pose a security threat not only because they are difficult to detect and work across a wide variety of software and hardware but also because they could be inconspicuously deployed on a large scale.
In what the paper’s authors term a “supply chain attack,” manufacturers would build a JitterBug into their keyboards. Such a vulnerability would be extremely difficult to detect — neither the keyboard nor the victim’s computer would appear to be doing anything unusual — but anyone who knew of the devices could decode the data they sent, getting backdoor access to thousands of computers.
This threat, however far-fetched, seems particularly relevant in light of the U.S. government’s decision in May use computers built by Lenovo only for processing unclassified data. The Chinese government owns 28 percent of Lenovo, information that sparked fears of espionage. As it turns out, numerous keyboards are also manufactured in China.
To be sure, JitterBugs are a purely theoretical threat as far as anyone can tell, and intercepting the data they send is not a trivial matter. Still, they could be much easier to deploy and read than today’s keyloggers — and those have been, and probably still are, used for spying.