Beward ! Built-in Keylogger Discovered In Several Hp Laptops Models

 

Do you own a Hewlett-Packard (HP) laptop?

Yes? Just stop whatever you are doing and listen carefully:

Your HP laptop may be silently recording everything you are typing on your keyboard.

While examining Windows Active Domain infrastructures, security researchers from the Switzerland-based security firm Modzero have discovered a built-in keylogger in an HP audio driver that spy on your all keystrokes.

In general, Keylogger is a program that records every keystroke by monitoring every key you have pressed on your keyboard. Usually, malware and trojans use this ability to steal your account information, credit card numbers, passwords, and other private data.HP computers come with Audio Chips developed by Conexant, a manufacturer of integrated circuits, who also develops drivers for its audio chips. Dubbed Conexant High-Definition (HD) Audio Driver, the driver helps the software to communicate with the hardware.

Depending upon the computer model, HP also embeds some code inside the audio drivers delivered by Conexant that controls the special keys, such as Media keys offers on the keypad.

Keylogger Found Pre-Installed in HP Audio Driver

According to researchers, the flawed code (CVE-2017-8360) written by HP was poorly implemented, that not just captures the special keys but also records every single key-press and store them in a human-readable file.

This log file, which is located at the public folder C:\Users\Public\MicTray.log, contains a lot of sensitive information like users’ login data and passwords, which is accessible to any user or 3rd party applications installed on the computer.

Therefore, a malware installed on or even a person with physical access to a PC can copy the log file and have access to all your keystrokes, extracting your sensitive data such as bank details, passwords, chat logs, and source code.

“So what’s the point of a keylogger in an audio driver? Does HP deliver pre-installed spyware? Is HP itself a victim of a backdoored software that third-party vendors have developed on behalf of HP?” Modzero researchers question HP.

In 2015, this keylogging feature was introduced as a new diagnostic feature with an update version 1.0.0.46 for HP audio drivers and existed on nearly 30 different HP Windows PC models shipped since then.

Affected models include PCs from the HP Elitebook 800 series, the EliteBook Folio G1, HP ProBook 600 and 400 series, and many others. You can find a full list of affected HP PC models in the Modzero’s security advisory.Researchers also warned that “probably other hardware vendors, shipping Conexant hardware and drivers” may also be affected.

How to Check if You are Affected and Prevent Yourself

If any of these two following files exist in your system, then this keylogger is present on your PC:

  • C:\Windows\System32\MicTray64.exe
  • C:\Windows\System32\MicTray.exe

If any of the above files exist, Modzero advises that you should either delete or rename the above-mentioned executable file in order to prevent the audio driver from collecting your keystrokes.

“Although the file is overwritten after each login, the content is likely to be easily monitored by running processes or forensic tools,” researchers warned. “If you regularly make incremental backups of your hard-drive – whether in the cloud or on an external hard-drive – a history of all keystrokes of the last few years could probably be found in your backups.”

Also, if you make regular backups of your hard drive that include the Public folder, the keylogging file in question may also exist there with your sensitive data in plain text for anyone to see. So, wipe that as well.

Writed By:

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

 

Wanna Cry Ransomware!

A type of virus that infect computers, and then make the user’s data inaccessible the operating system, or encrypting the data stored on the computer,
The user asks the ransom to pay a fixed amount of money, as opposed to decrypting files or allowing access again to the operating system.

How To Stay Safe :

  • Be careful to click on harmful links in your emails.
  • Be wary of visiting unsafe or unreliable sites.
  • Never click on a link that you do not trust on a web page or access to Facebook or messaging applications such as WatSab and other applications.
  • If you receive a message from your friend with a link, ask him before opening the link to confirm, (infected machines send random messages with links).
  • Keep your files backed up regularly and periodically.
  • Be aware of fraudulent e-mail messages that use names similar to popular services such as PayePal instead of PayPal or use popular service names without commas or excessive characters.
  • Use anti virus and Always make have the last update.
  • Make sure your windows have the last update close the gap.

Update 5/15/2017 : 

The entry of the virus to your device, which is dependent on a gap in the Windows system and the gap is present in all types of Windows is that the feature is open.

if you did no’t update your windows just turn off SMP,

There are two methods to turn off SMP manually or Tools .

First Manually :

1.Control Panel\Programs\Programs and Features.

Image

2. Remove check Box  SMB1.0/CIF Filse Sharing Support.

Image

3. you must be restart your computer.

Done! Now you are safe. 


2. Tools :

Link Download direct: SMB2 Tools Disable 

1. RUN AS ADMINISTRATOR.

Image

2.First check if the Features is turn on !.
when you run the tools will show this, if you see SMB2 currently enable so you must be Disabled it

Image

3. SMB2 IS currently disabled.

Image

4. you must be restart your computer.

Done! Now you are safe. 

I hope it helps to keep you safe.