Monday, May 23, 2016

Beware of keystroke loggers disguised as USB phone chargers

FBI officials are warning private industry partners to be on the lookout for highly stealthy keystroke loggers that surreptitiously sniff passwords and other input typed into wireless keyboards.

The FBI's Private Industry Notification is dated April 29, more than 15 months after whitehat hacker Samy Kamkar released a KeySweeper, a proof-of-concept attack platform that covertly logged and decrypted keystrokes from many Microsoft-branded wireless keyboards and transmitted the data over cellular networks. To lower the chances that the sniffing device might be discovered by a target, Kamkar designed it to look almost identical to USB phone chargers that are nearly ubiquitous in homes and offices.
"If placed strategically in an office or other location where individuals might use wireless devices, a malicious cyber actor could potentially harvest personally identifiable information, intellectual property, trade secrets, passwords, or other sensitive information," FBI officials wrote in last month's advisory. "Since the data is intercepted prior to reaching the CPU, security managers may not have insight into how sensitive information is being stolen."

Sunday, May 15, 2016

2016 Espionage Research Institute International Counterespionage Conference



Annual ERII Counterespionage Conference September 9, 10 & 11th 2016 at the Embassy Suites - Old Town Alexandria, VA 22314.


TSCM professionals from across the globe will meet to discuss counter espionage news and events, see demonstrations of new TSCM equipment and network with colleagues.

The ERII Conference experience will include presentations by top experts in the fields of Technical Surveillance Countermeasures (TSCM), Counterintelligence Counterespionage, Cyber Countermeasures, Equipment vendors and more.