iTnews
  • Home
  • News
  • Technology
  • Security

HP notebooks shipped with keylogging audio driver

By Juha Saarinen on May 12, 2017 8:20AM
HP notebooks shipped with keylogging audio driver

Users advised to delete bundled snoopware driver from laptop.

Portable computers from HP Inc are shipped with an audio driver that silently captures all user keystrokes and records them in an unprotected file, causing major security and privacy risks.

Researcher Torsten Schroeder from Swiss security vendor ModZero discovered that the MicTray64.exe driver from chip vendor Conexant, which makes sound circuits for HP, logged all keystrokes on a HP laptop via a software debugging interface.

Data captured included sensitive information such as passwords and user logins, which are stored in an easily accessible and unencrypted text file under the Windows world-readable public subdirectory used for sharing on networks.

This means any process running on Windows can read the file, and forensic tools can access its contents. 

While the file is overwritten each time the computer starts up, ModZero said system backups would keep a complete history of user keystrokes.

Schroeder said the driver is digitally signed by Conexant, and has been installed on HP computers since at least December 2015. 

He said the keylogger was most likely not installed with malicious intent.

"There is no evidence that this keylogger has been intentionally implemented. Obviously, it is a negligence of the developers - which makes the software no less harmful," Schroeder wrote.

ModZero reported the security issue to both vendors, but received no response from either.

HP's EliteBook and ProBook range of laptops come with the keylogging Conexant driver, as do the zBook mobile workstations, the Elite x2 1012 G1 series of tablets, as well as the EliteBook 725, 745, 755, 1030 and Folio notebooks.

Removing the offending scheduled task is not sufficient to disable the keystroke logging, the researcher said.

Instead, users should delete the MicTray executable and the log files it has created from the $WINDIR$\System32 and $USERS$\Public directories on their device.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
conexanthpkeyloggerlaptopsecurity

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Juha Saarinen
May 12 2017
8:20AM
0 Comments

Related Articles

  • HP patches critical bugs in Teradici PCoIP software
  • Serious vulnerabilities found in HP printer models
  • Collins Foods puts IT focus on security controls, cloud services
  • OpenSSL subject to remote memory corruption
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

NSW Police scores $100m to connect body-cams to firearms, tasers

NSW Police scores $100m to connect body-cams to firearms, tasers

Digital Nation

COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.