Almost got fired over my keyboard
-
- Location: Bensalem, PA, USA
- Main keyboard: IBM Model M
- Main mouse: Kensington Slimblade Trackball
- Favorite switch: Buckling Spring
- DT Pro Member: -
- Contact:
I've been using my Mini M for years on my work laptop. I bought a new RPI2040 based controller for it and flashed QMK/VIAL on it within weeks of QMK/VIAL getting released.
Today, I am typing away, and some security tool tells me it disabled my network access for my protection. I get kicked off of VPN and my laptop loses all network connectivity.
Within minutes, my boss calls me and tells me I plugged a USB Ninja hacking tool into my laptop. He says he got an automated email and it says the device is called a "Unicomp Mini-M."
My boss knows what that is, finds a link to it on Unicomp's website, and sends it to the security team. Clearly, this is a false positive. I mean, I've been using this keyboard with QMK on it for months.
In the end, they agree to "unlock" my laptop, but told me I can never use the Mini-M on my work computer again.
Today, I am typing away, and some security tool tells me it disabled my network access for my protection. I get kicked off of VPN and my laptop loses all network connectivity.
Within minutes, my boss calls me and tells me I plugged a USB Ninja hacking tool into my laptop. He says he got an automated email and it says the device is called a "Unicomp Mini-M."
My boss knows what that is, finds a link to it on Unicomp's website, and sends it to the security team. Clearly, this is a false positive. I mean, I've been using this keyboard with QMK on it for months.
In the end, they agree to "unlock" my laptop, but told me I can never use the Mini-M on my work computer again.
-
- Location: Canada
- Main keyboard: Matias Ergo Pro w/ Salmon ALPS + white PBT keycaps
- Main mouse: M570
- Favorite switch: ALPS Orange, Salmon, Blue
Such is the state of cybersecurity these days. Risks are too high to entertain your fancy custom keyboard. I don't blame them at all, sadly, they have an impossible job to fend off the bad actors and keep the company functioning at the same time.
Sucks though for sure.
Sucks though for sure.
-
- Location: South Korea
- Main keyboard: IBM Model M(Lexmark Blue Badge, 1994)
- Main mouse: Logitech G502
- Favorite switch: Buckling Springs, Vintage MX Black, Alps Blue
huh, never expected the rpi controller to interfere with the security system that way.
-
- Location: Vermont
- Main keyboard: BFO-9000
- Main mouse: Logitech G600
- Favorite switch: MX Blues
- DT Pro Member: -
RPi are reprogrammable micro controllers,IT literally has no way of knowing if it's a Mini-M or hacking tool that looks like a Mini-M.
They are doing their jobs and that job is to be paranoiac about anything/everything touching the company network.
They are doing their jobs and that job is to be paranoiac about anything/everything touching the company network.
- vvp
- Main keyboard: Katy/K84CS
- Main mouse: symetric 5-buttons + wheel
- Favorite switch: Cherry MX
- DT Pro Member: -
Get a patch for your firmware so that the keyboard is behaving as a standard USB (boot) keyboard when connected to a PC. If you need extensions to the standard protocol then make them optional and activate them only when not connected to company PC. You may need to cheat on VendorId and ProductId as well. I would not be surprised if their glorified security scan only checks for VendorId/ProductId. It is a lame approach but it is simple.
Maybe switch your employer when they cannot give you an exception for your keyboard.
Maybe switch your employer when they cannot give you an exception for your keyboard.
- engr
- Location: USA
I just find it hilarious that of all the keyboards in the world the one they found suspicious was the last keyboard that is mass-produced here in the US by a successor to the IBM OEM manufacturer.
Not a random unnamed board from an Amazon seller named YZXYZOO, not a Franken-board hand-wired in a garage using totally legit components from Aliexpress, not a mysterious PS2-to-USB dongle from eBay, but a board by the effing UNICOMP.
Not a random unnamed board from an Amazon seller named YZXYZOO, not a Franken-board hand-wired in a garage using totally legit components from Aliexpress, not a mysterious PS2-to-USB dongle from eBay, but a board by the effing UNICOMP.
-
- Location: USA
- Main keyboard: i-Rocks compact
- Main mouse: Logitech Trackman
- Favorite switch: IBM buckling spring
USB devices need software device drivers to work. Operating systems support a bunch of generic or common devices out of the box. Otherwise, the USB stick, keyboard, hard drive, scanner, etc. has device driver software built in. If the OS doesn't recognize the device, it queries if a driver is available, and then installs it.
By default, without prompting, in most cases.
At administrator/root access level.
That "finished installing your device" popup in Windows? You're already pwned if it was a malicious device.
Yes, there have been documented cases of malware in keyboards... but in this case, they let your computer log back in *after* you'd infected it with buckling-spring goodness. Which is a total WTF from a security standpoint; they're just being jerks.
By default, without prompting, in most cases.
At administrator/root access level.
That "finished installing your device" popup in Windows? You're already pwned if it was a malicious device.
Yes, there have been documented cases of malware in keyboards... but in this case, they let your computer log back in *after* you'd infected it with buckling-spring goodness. Which is a total WTF from a security standpoint; they're just being jerks.
-
- Location: Bensalem, PA, USA
- Main keyboard: IBM Model M
- Main mouse: Kensington Slimblade Trackball
- Favorite switch: Buckling Spring
- DT Pro Member: -
- Contact:
I wonder if the USB Ninja uses a RPI2040 Microcontroller.
-
- Location: Bensalem, PA, USA
- Main keyboard: IBM Model M
- Main mouse: Kensington Slimblade Trackball
- Favorite switch: Buckling Spring
- DT Pro Member: -
- Contact:
I just wonder what set it off NOW. I've been using this keyboard for years. And it worked fine for a few hours and then something happened that triggered the alert.kshopper2084 wrote: ↑11 Jun 2024, 17:05Such is the state of cybersecurity these days. Risks are too high to entertain your fancy custom keyboard. I don't blame them at all, sadly, they have an impossible job to fend off the bad actors and keep the company functioning at the same time.
Sucks though for sure.
I've switched to a Bluetooth keyboard for now, but I would really prefer wired. The battery life of most Bluetooth keyboards is not very good.
I wonder if the USB Ninja false positive was because of the QMK firmware. I was debating pulling my PS/2 Model M out and using my Soarers Converter. I've used that for probably six months on this computer. But I don't need another "false positive" and a call from HR over my desire to type on a Model M.
-
- Location: Bensalem, PA, USA
- Main keyboard: IBM Model M
- Main mouse: Kensington Slimblade Trackball
- Favorite switch: Buckling Spring
- DT Pro Member: -
- Contact:
I could log in, but they killed all my network access. Had I been in the building, someone would show up at my desk and take my PC and peripherals and I would get them back after a complete scan of everything.AndyJ wrote: ↑12 Jun 2024, 14:28USB devices need software device drivers to work. Operating systems support a bunch of generic or common devices out of the box. Otherwise, the USB stick, keyboard, hard drive, scanner, etc. has device driver software built in. If the OS doesn't recognize the device, it queries if a driver is available, and then installs it.
By default, without prompting, in most cases.
At administrator/root access level.
That "finished installing your device" popup in Windows? You're already pwned if it was a malicious device.
Yes, there have been documented cases of malware in keyboards... but in this case, they let your computer log back in *after* you'd infected it with buckling-spring goodness. Which is a total WTF from a security standpoint; they're just being jerks.
Once I changed keyboards, they remotely enabled my network access and I was good to go.
- vvp
- Main keyboard: Katy/K84CS
- Main mouse: symetric 5-buttons + wheel
- Favorite switch: Cherry MX
- DT Pro Member: -
Based on your 1st post you updated controller and firmware on your keyboard recently. PC scans USB bus for the connected devices anytime an USB device is connected or when PC boots. How an USB device looks to the PC is defined in the device firmware - specifically the device descriptor the firmware sends to the PC. When you change the firmware then it will likely send a different descriptor and PC will think you connected a completely different device (keyboard).apastuszak wrote: ↑12 Jun 2024, 15:49I just wonder what set it off NOW. I've been using this keyboard for years. And it worked fine for a few hours and then something happened that triggered the alert.
- vvp
- Main keyboard: Katy/K84CS
- Main mouse: symetric 5-buttons + wheel
- Favorite switch: Cherry MX
- DT Pro Member: -
Here is the device descriptor for my keyboard:
It is likely your employer only looked at the descriptor. Maybe only VendorId and ProductId. Maybe they looked whether there is some vendor specific interface or some unusual interface protocol. E.g. to make my kebyboad look very standard I would need to:
Spoiler:
- remove the vendor specific interface
- maybe remove the descriptor for the mouse
- maybe fake VendorId & ProductId
-
- Location: Bensalem, PA, USA
- Main keyboard: IBM Model M
- Main mouse: Kensington Slimblade Trackball
- Favorite switch: Buckling Spring
- DT Pro Member: -
- Contact:
I understand how it works. I just wonder why:
1. The updated controller was fine for months and suddenly it was not.
2. The software identified the mini-M as a USB Ninja, a hacking USB cable that can receive wireless commands to deliver a malicious payload. USB Ninjas are transparents to the OS. They look just like a USB cable to the operating system.
I wonder if soneone
1. The updated controller was fine for months and suddenly it was not.
2. The software identified the mini-M as a USB Ninja, a hacking USB cable that can receive wireless commands to deliver a malicious payload. USB Ninjas are transparents to the OS. They look just like a USB cable to the operating system.
I wonder if soneone
- vvp
- Main keyboard: Katy/K84CS
- Main mouse: symetric 5-buttons + wheel
- Favorite switch: Cherry MX
- DT Pro Member: -
... or maybe USB Ninja uses QMK (like) descriptor when triggered as a keyboard.
USB Ninja is transparent only when inactive (not triggered).
USB Ninja is transparent only when inactive (not triggered).
Last edited by vvp on 13 Jun 2024, 21:42, edited 1 time in total.
-
- Location: Bensalem, PA, USA
- Main keyboard: IBM Model M
- Main mouse: Kensington Slimblade Trackball
- Favorite switch: Buckling Spring
- DT Pro Member: -
- Contact:
- vvp
- Main keyboard: Katy/K84CS
- Main mouse: symetric 5-buttons + wheel
- Favorite switch: Cherry MX
- DT Pro Member: -
Use a different firmware or get a patch for QMK which will use a standard keyboard descriptor. You may lose some features (e.g. the Vial GUI will likely not work when the keyboard uses the standard descriptor). But the pathch can be done in such a way that you could activate full QMK functionality (i.e. also use the original QMK descriptor) only when you e..g. press some special key combination while the keyboard is powered up. Then you only need to remember not to press it while connecting to your work computer
I cannot really help you much. I do not use QMK. Last time I checked (around 2015) it was worse than my firmware of choice.
I cannot really help you much. I do not use QMK. Last time I checked (around 2015) it was worse than my firmware of choice.
-
- Location: Bensalem, PA, USA
- Main keyboard: IBM Model M
- Main mouse: Kensington Slimblade Trackball
- Favorite switch: Buckling Spring
- DT Pro Member: -
- Contact:
I'm using the Nuphy Air75 V2 now over Bluetooth. It has QMK/VIA on it and that one hasn't set off any alarms. I'm not a huge fan of low profile keyboards. And I really don't like wireless keyboards. But it is what it is.
What's your firmware of choice?
What's your firmware of choice?
- vvp
- Main keyboard: Katy/K84CS
- Main mouse: symetric 5-buttons + wheel
- Favorite switch: Cherry MX
- DT Pro Member: -
I use my branch of chrisandreae's firmware: https://github.com/hercek/keyboard-firmware
At the time I was deciding, it was the only one with the proper on-the-fly macro and remap features. A possibility to define macros/programs in a GUI application (likely something like Vial for QMK now) was only a minor bonus.
At the time I was deciding, it was the only one with the proper on-the-fly macro and remap features. A possibility to define macros/programs in a GUI application (likely something like Vial for QMK now) was only a minor bonus.
-
- Location: The Netherlands
- Main keyboard: Tulip ATK 02.01.01 Tactile
- Main mouse: Logitech G603
- Favorite switch: Alps
I could totally see this happening with the active adapter I use for my XT keyboard at work, might just switch back to plain old PS/2 aha
-
- Location: US
- Main keyboard: Omnikey 102 Blackheart
- Main mouse: Kensington Expert Mouse
- Favorite switch: White Alps
- DT Pro Member: 0174
I'm sort of surprised that my cavalcade of HID devices never gets any attention from the security team at work. The firmware on my keyboard identifies as a 'qmkbuilder Overton130', and there are two different trackballs hanging off.
I suppose that's part of the reason I haven't swapped in the newer model at my workstation; the default descriptor of my current firmware lists the manufacturer as "Galley-La Company", and everyone knows that they're a hopelessly compromised organization. The VID/PID is also nonsense.
More seriously, I wonder if they'd consider the OLED visualization a keylogger.
On the other hand, the company Slack does have a keyboard-centric channel, and there are a few people with weird ergo builds, so exotic input is maybe to be expected. I recall someone had a Matias Quiet Pro on his desktop when I visited the head office pre-Covid.
I suppose that's part of the reason I haven't swapped in the newer model at my workstation; the default descriptor of my current firmware lists the manufacturer as "Galley-La Company", and everyone knows that they're a hopelessly compromised organization. The VID/PID is also nonsense.
More seriously, I wonder if they'd consider the OLED visualization a keylogger.
On the other hand, the company Slack does have a keyboard-centric channel, and there are a few people with weird ergo builds, so exotic input is maybe to be expected. I recall someone had a Matias Quiet Pro on his desktop when I visited the head office pre-Covid.