Dramatic tone change for no actual new news. Sure this is getting the person's blog attention, but now I'm certain I don't agree with the alarmist title of the original post.
If the attacker has access to the computer, why not install some other key logger that would send info to the attacker's site?
[1] https://diablohorn.com/2017/05/12/repurposing-the-hp-audio-k...
You need write access HKLM in order to change the registry key, if you have write access to HKLM you can inject your own driver (inc. keylogger) into the OS.
Plus the keypresses are context-less (i.e. you don't know what application, or window the keypress was sent to). A continuous stream of keypresses with no context is darn near useless, it doesn't even contain timestamps!
Any number of off-the-shelf keyloggers would do a far better job, all of which can be auto-loaded if you have HKLM write access. They'll even tell you the exact web page a keypress was sent to and manage the job of sending that information to you...
Because one would assume that this software/driver has been signed and would not be recognized as evil by any protection system, at least not one on the laptop.
https://www.bleepingcomputer.com/news/security/keylogger-fou...
"writes all keystrokes to a local file at:
C:\users\public\MicTray.log"
Note: Public folder! All keystrokes. Discovered May 2017, preinstalled on 28 HP laptop models. Other hardware that uses this driver may also be affected.
Edit, to the other commenters in other threads: please don't mix them, there are two "keyloggers." The one in the audio(!) driver was always on, recording by default to the publicly accessible file, as seen here.
The one in the new news is a code in the keyboard driver that can be turned on (and here it's important to know if the switch is publicly accessible) but isn't on by default. Depending on how that one is turned on and where the result is logged, it can be not worthy to worry too much. But these details also matter.
Every laptop I've ever had allowed volume control with function keys.
Disclaimer: it's been over a decade since I've done applications development and I've never done driver development.
There are always contrarians, and in this case the comment-section contrarians ended up amusingly contradicting themselves.
According to HP, it was originally built into the Synaptics software to help debug errors."
How bad is this really then? If an attacker could enable it, they could install another key logger anyway if this feature didn't exist? Can HP enable it remotely (I'm guessing not)?
If you have HP's update agent installed, HP are able to install drivers, so all bets are off as far as what HP could do to your machine. They could enable this via the update agent, but even assuming worst motivations there are a tens of better commercial keyloggers HP would use before this.
This debug functionality likely shouldn't be shipping in retail versions of the driver (defence in depth, etc) and should be removed. But there's a ton of misinformation surrounding this bug which is frustrating, the actual security community are already bored of this one.
nope. you need administrator if you want to install for all users, but there's nothing preventing a user from keylogging himself.
If it's a binary and potentially readable, they probably shouldn't include the code switch to enable it. Better it never be in there to begin with.
But yeah, if it's disabled by default and looks like a debugging tool, it probably is.
http://www.tomshardware.com/news/hp-keylogger-debugging-tool...
How many of these "debugging tools" has HP left enabled, I wonder?
You can make any piece of software that takes user input sound like a "keylogger" with the right wording, that the word has basically lost all meaning.
It's considerably harder with phones, with all of them running non standard, non upstreamable kernels, and consumers not really having alternative OSes like we do with PCs.
Because of this, there is no trivial way (edit: OK, without buying Windows again) to get a vanilla install including only the Microsoft keylogger, but not the HP one.
It's even very easy to get the install media direct from Windows, not like back in XP days.
https://www.microsoft.com/en-us/software-download/windows10I...
https://www.engadget.com/2017/11/28/hp-quietly-installs-syst...
In this specific case, if the debugging "leftovers" were part of the official drivers, then I would say there is a good indication towards preferring a free OS.
I worked for a HP reseller at the time and could replication the issue on almost every model in our labs
Why not "Windows found to have hidden keylogger", it also ships with functionality that allows you to capture keystrokes if you so insist?