![usb keylogger phone charger usb keylogger phone charger](https://hackerwarehouse.com/wp-content/uploads/2019/02/keylogger-extension-cable-454A9959a.jpg)
![usb keylogger phone charger usb keylogger phone charger](https://i2.wp.com/9to5mac.com/wp-content/uploads/sites/6/2021/09/Wireless-key-logger-inside-cable.jpg)
The FBI advisory warns system administrators that since KeySweeper is an Arduino device, it’s modular and programmable and can used against a number of communication protocols used by wireless equipment. “I don’t know of any real world attacks but I wouldn’t be surprised at all if it’s being used,” he told Threatpost. Kamkar said he was in the dark as to why the alert was released now. “This data is provided in order to help systems administrators guard against the actions of persistent cyber criminals.”Ī request for comment from Kamkar was not returned in time for publication. “Unfortunately I cannot comment on the alert specifically, but in furtherance of public-private partnerships, the FBI routinely advises private industry of various cyber threat indicators observed during the course of our investigations,” an FBI spokesperson told Threatpost. The FBI advisory is dated April 29 the bureau would not comment on whether any real-world attacks had been carried out using KeySweeper.
#Usb keylogger phone charger how to#
Sixteen months ago, Kamkar released the source code and instructions on how to build the device, which looks like a commodity USB wall charger (right), but is in fact a keylogger that sniffs keystrokes sent from any nearby wireless Microsoft keyboard. A private industry notification sent by the FBI in late April to its business partners warns of the risks associated with KeySweeper, a tool released in January 2015 by noted hardware hacker and researcher Samy Kamkar.