LoyceV
Legendary
Offline
Activity: 3290
Merit: 16569
Thick-Skinned Gang Leader and Golden Feather 2021
|
|
October 20, 2022, 05:59:09 PM |
|
If we consider that there are USB cables that can steal coins from hardware wallets, we can assume that something similar can exist for keyboard hacking as well. Don't you love how USB is so versatile? It can be used to charge your phone, or connect your keyboard, mouse and data storage. Or all at once without you knowing it: a normal looking USB cable can pretend to be a keyboard and give your computer instructions. Since it looks like a keyboard to the computer, it instantly gets very powerful access. And you don't even notice it when you plug in a cable to charge your phone. Cables like the O.MG Cable can do stuff from nightmares to your system.
|
|
|
|
|
|
|
|
"Governments are good at cutting off the heads of a centrally
controlled
networks like Napster, but pure P2P networks like Gnutella and Tor seem
to be holding their own." -- Satoshi
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
Crypt0Gore
|
|
October 21, 2022, 07:25:22 AM |
|
Clipboard hacks and keyloggers are very popular but still I don't joke with my PC, avoid inserting any USB Drive in your PC, this days it's better to use Sender software to send file to people, do not plug their own USB whatever into your PC, you don't know what they may have in mind for you.
|
|
|
|
nakamura12
|
|
October 21, 2022, 01:19:55 PM |
|
It is very possible to get your private keys. If you are using public pc which is very common here in my country and those who plan to do that can install a program that records everything you press on the keyboard. The other one is clipboard hijacking or clipboard malware which will change whatever you just copied on the internet. For example, I copied bc1address but when you paste it became bc1address2.
|
| | | | | | | ███▄▀██▄▄ ░░▄████▄▀████ ▄▄▄ ░░████▄▄▄▄░░█▀▀ ███ ██████▄▄▀█▌ ░▄░░███▀████ ░▐█░░███░██▄▄ ░░▄▀░████▄▄▄▀█ ░█░▄███▀████ ▐█ ▀▄▄███▀▄██▄ ░░▄██▌░░██▀ ░▐█▀████ ▀██ ░░█▌██████ ▀▀██▄ ░░▀███ | | ▄▄██▀▄███ ▄▄▄████▀▄████▄░░ ▀▀█░░▄▄▄▄████░░ ▐█▀▄▄█████████ ████▀███░░▄░ ▄▄██░███░░█▌░ █▀▄▄▄████░▀▄░░ █▌████▀███▄░█░ ▄██▄▀███▄▄▀ ▀██░░▐██▄░░ ██▀████▀█▌░ ▄██▀▀██████▐█░░ ███▀░░ | | | | |
|
|
|
isaac_clarke22
|
|
October 21, 2022, 04:28:35 PM |
|
~
Dang, I could not imagine people buying this to mess with people, although I was expecting somehow that these kinds of cable exists anyway since it is USB. I was thinking of getting a wireless keyboard back in the days, but meh I ain't risking my security as well with dongles these days considering that hardware keylogger were always there to screw me up.
|
|
|
|
Eureka_07
Sr. Member
Offline
Activity: 1750
Merit: 260
Binance #SWGT and CERTIK Audited
|
|
October 21, 2022, 05:01:04 PM |
|
Brothers and sisters is it possible for PC keyboard to get compromised and reveal your private keys to hackers? How are they doing it? I read a comment on Reddit about a guy that lost his keys to hackers through a keyboard hack, is it in form of Trojan or Malware?.
I am not familiar with the specifics but I really believe that it is possible. One technique that is widely known is the keyloggers, which detects and monitor every key that you pressed. Through that the hacker can get your information such as email, passwords, etc. Moreover, wireless keyboards are more susceptible to being hacked as those that manufactures these keyboard doesn't include any encrypting method on key strokes. Trojan is a type of Malware. Malware is a general term for "software" that are "malicious" including Trojan.
|
|
|
|
Alisha-k
Member
Offline
Activity: 840
Merit: 23
|
|
October 21, 2022, 07:17:22 PM |
|
It is very possible and one way they get access to your PC is through spam mails. Avoid clicking any site sent by unknown users. Thos hackers send Malicious software through different means even through adverts and once anyone clicks the link the gain access to what ever device is connected to their website. Ensure to verify links sent that it starts with Https:// and also look at the bottom of ur device to see the color of the address appears in green at the bottom right of your PC before clicking on it. Alternative search for the website on any reliable search engine preferably Google.
|
|
|
|
JeromeTash
Legendary
Online
Activity: 2128
Merit: 1210
Heisenberg
|
|
October 21, 2022, 08:03:59 PM |
|
Dang, I could not imagine people buying this to mess with people, although I was expecting somehow that these kinds of cable exists anyway since it is USB.
Or you just buying it unknowingly and cheaply as a replacement to your old or spoiled mobile USB cable from one of those online shopping sites like Aliexpress only for you to plug it into your PC while trying to charge or tethering the phone to PC
|
|
|
|
LoyceV
Legendary
Offline
Activity: 3290
Merit: 16569
Thick-Skinned Gang Leader and Golden Feather 2021
|
|
October 22, 2022, 06:29:10 AM |
|
~
Dang, I could not imagine people buying this to mess with people, although I was expecting somehow that these kinds of cable exists anyway since it is USB. I'm not so worried about a targeted attack with an expensive O.MG Cable. I'm much more worried that the tiny chip inside a cable becomes cheap enough for Chinese mass production, and millions of people will use it unknowningly. USB hubs can have the same risk. I was thinking of getting a wireless keyboard back in the days, but meh I ain't risking my security Cables are a lot easier to protect. One technique that is widely known is the keyloggers, which detects and monitor every key that you pressed. For the truely paranoid: don't type sequential, use your mouse to click half way your password to continue typing a few times. I do this sometimes with private keys: I copy one part, and type another part.
It's the thing I hate most about modern cables: they all have a chip inside (meant to identify power ratings). I miss the days when a cable was just a piece of copper connecting 2 points.
|
|
|
|
Saint-loup
Legendary
Offline
Activity: 2590
Merit: 2352
|
|
October 22, 2022, 07:57:24 PM |
|
If we are talking about real keyboard (device) hacking, I guess anything is possible if the hacker had physical access to your device. If we consider that there are USB cables that can steal coins from hardware wallets, we can assume that something similar can exist for keyboard hacking as well. For example, someone can create a USB device that connects between the keyboard and the computer that will register everything that is typed on the keyboard and record it in internal memory or wirelessly send the data to the hacker. If this device is plugged into your computer while you are typing, it can record all the characters that you type. And if the hacker has access to this data, he or she will be able to recover your passwords or private keys.
I don't understand why you say that the hacker needs to create himself the device. You don't need to live with an electronic engineer to be subjected to this kind of attack actually. It's not new. A random "evil maid" just needs to look for a keylogger on Google, to be able to freely purchase one in few minutes. She doesn't even need to go on the darknet to find a cheap one for $20. E.g. https://www.keydemon.com/en/39-hardware-keylogger
|
|
|
|
isaac_clarke22
|
|
October 22, 2022, 08:12:29 PM |
|
~
Or even in Wish. I remember a lot of hardware content creators buying some stuffs from there and ended up having a different from what they were expecting. Good thing I do not cheap out on PC components anyway though I am also avoiding overspending on peripherals. Cables are a lot easier to protect.
True. I also hate dealing with latency issues with the wireless devices. Could be convenient for some but not for me.
|
|
|
|
Stalker22
Legendary
Offline
Activity: 1484
Merit: 1357
|
|
October 22, 2022, 09:15:08 PM |
|
~
I don't understand why you say that the hacker needs to create himself the device. You don't need to live with an electronic engineer to be subjected to this kind of attack actually. It's not new. A random "evil maid" just needs to look for a keylogger on Google, to be able to freely purchase one in few minutes. She doesn't even need to go on the darknet to find a cheap one for $20. E.g. https://www.keydemon.com/en/39-hardware-keyloggerHonestly, I had no idea that these devices already existed, and I answered the question "off the top of my head." But now that we know they exist, and are readily available on the market, the threat becomes even more possible and realistic. Thank you for this info.
|
|
|
|
Peanutswar
Legendary
Offline
Activity: 1526
Merit: 1027
Top Crypto Casino
|
|
October 23, 2022, 01:30:33 PM |
|
Once your computer got or injected with the Malware, these malware can take your information such as the files, change into other format that's we called as ransomware most of the time hackers are asking for the bitcoin as a payment to your retrieved files back, also we have the keylogger once you installed a suspicious file into your computer and allowing access to your computer they can now have the full potential of the users activity, the best way is to reformat your computer and store your funds into hardware wallet.
|
|
|
|
Taskford
|
|
October 23, 2022, 01:41:47 PM |
|
Brothers and sisters is it possible for PC keyboard to get compromised and reveal your private keys to hackers? How are they doing it? I read a comment on Reddit about a guy that lost his keys to hackers through a keyboard hack, is it in form of Trojan or Malware?.
If you download unknown links coming out of nowhere then provably they can. Hackers right now are so smart and they can do unimaginable things so best to avoid seeking for something on google search since this is where you can get those malwares. If you feel your pc is infected much better if you follow the suggestions above and that is to reformat your pc to avoid any possible upcoming attacks.
|
| . .Duelbits. | │ | | │ | ▄▄█▄▄░░▄▄█▄▄░░▄▄█▄▄ ███░░░░███░░░░███ ▀░░░▀░░▀░░░▀░░▀░░░▀ ▄░░░░░░░░░░░░ ▀██████████ ░░░░░███░░░░▀ ░░█░░░███▄█░░░█ ░░██▌░░███░▀░░██▌ ░█░██░░███░░░█░██ ░█▀▀▀█▌░███░░█▀▀▀█▌ ▄█▄░░░██▄███▄█▄░░▄██▄ ▄███▄ ░░░░▀██▄▀ | . REGIONAL SPONSOR | | ███▀██▀███▀█▀▀▀▀██▀▀▀██ ██░▀░██░█░███░▀██░███▄█ █▄███▄██▄████▄████▄▄▄██ ██▀ ▀███▀▀░▀██▀▀▀██████ ███▄███░▄▀██████▀█▀█▀▀█ ████▀▀██▄▀█████▄█▀███▄█ ███▄▄▄████████▄█▄▀█████ ███▀▀▀████████████▄▀███ ███▄░▄█▀▀▀██████▀▀▀▄███ ███████▄██▄▌████▀▀█████ ▀██▄███▀██▄█▄▄▄██▄████▀ ▀▀██████████▄▄███▀▀ ▀▀▀▀█▀▀▀▀ | . EUROPEAN BETTING PARTNER | |
|
|
|
Shaha98
|
|
October 24, 2022, 04:15:13 AM |
|
Hackers can access your computer through malware. May even get your personal information or access. And if you copy the phases then they can get your key too. And if it continues like this you will force everything into someone else's hands if you don't notice. Which you will regret later. Many have lost a lot of wealth to hackers in this way.
|
|
|
|
Mpamaegbu
Legendary
Offline
Activity: 2674
Merit: 1208
Once a man, twice a child!
|
|
October 25, 2022, 08:47:29 AM |
|
I like watching Kitboga, Pierogi and the rest of the dudes dealing scammers hot blows on YouTube. One of the things I've come to note about all scammers is that they can't harm their victims if the victims don't grant them access to their devices. It's the same thing with hackers. No hacker can hack anything if a victim hasn't compromised anything. When this compromise happens and the victims falls prey, they hardly tell exactly what happened. They want to paint a picture of their innocence and how they were unaware of how they were hacked or scammed. There's something called Remote Access. No one can hack a device if the victim didn't grant them a remote access to their device. It's always a link to click or a set of codes to enter and the scammer is with you. That I learnt from YouTube, following those dudes I mentioned above. So, if one stays without clicking on suspicious and irrelevant links there's no way they can get malware.
|
|
|
|
boyptc
|
|
October 25, 2022, 09:57:10 AM |
|
Once your computer got or injected with the Malware, these malware can take your information such as the files, change into other format that's we called as ransomware most of the time hackers are asking for the bitcoin as a payment to your retrieved files back, also we have the keylogger once you installed a suspicious file into your computer and allowing access to your computer they can now have the full potential of the users activity, the best way is to reformat your computer and store your funds into hardware wallet.
All of these malwares are worst. They're all targeting our files, and for these ransomwares, they're using the files as hostage and making the victim believe that they've got the password for the encryption of it. I've read some victims have said that there's really no password on the ransomware that they contain and that's part of the hack and scam that these hackers do. Whilst I've read also from some of them that have given the password for encryption about paying the ransom. Needless of that, don't be a victim of them and avoid those pirate and crack websites, don't download there. If a license is needed to get paid and you need it for your productivity, just buy it.
|
|
|
|
isaac_clarke22
|
|
October 25, 2022, 08:26:14 PM |
|
~
Oh hey! I also watch them and Jim Browning as well. Kit is even streaming as of writing this. The script are almost the same to each and every scammers not gonna lie. It is just that those typical refund scam usually and they require remote access to your PC claiming that they will connect you to a "bs" secured server of whatever company they were from, be it Geek Squad, Microsoft, Norton, etc. It is quite scary that they were really up to loot whatever you have in your PC as they could already had planted some malware or "backdoor" in your computer giving them almost the full access to it without your knowledge.
|
|
|
|
Mpamaegbu
Legendary
Offline
Activity: 2674
Merit: 1208
Once a man, twice a child!
|
|
October 25, 2022, 10:04:49 PM |
|
~
Oh hey! I also watch them and Jim Browning as well. Kit is even streaming as of writing this. It's good to know someone else here watches and values their efforts. Those dudes are of a great service to many of us who dwell on the cyberspace, with their attempt at sanitizing it. I've watched a clip where Kit and Jim Browning (I think it was him or Pierogi. Can't be too sure anymore) combined to disrupt scammers' peace. There's also Trilogy Media, those guys are equally good too.
|
|
|
|
isaac_clarke22
|
|
October 26, 2022, 08:51:26 PM |
|
~
Oh yeah, I forgot to mention them. Not gonna lie, that guy Jaani has some inspirational story after he changed his ways. I have not watched Kit and Pierogi together yet though since I believe they do not have the same "methodology" in disrupting scammer's time. Both of them are great still. ScammeRevolts is also worth watching, since we can see how he messes with the scammer's computer files and what usually these scammers are storing in their PC files.
|
|
|
|
|
|