Keylogger Discovered in HP Audio Driver

keylogger-discovered-in-hp-audio-driver photo 1

If you own or use a HP computer it's time to check whether either C:\Windows\System32\MicTray64.exe or C:\Windows\System32\MicTray.exe in installed. If either is, you have an active keylogger recording all key presses and need to take action by renaming the executable file.

Usually when a new keylogger is discovered and reported about publicly, it's found to be malicious spyware and the parties affected have responded to the threat. However, in this case the opposite is true. A keylogger was discovered running on HP computers that isn't malicious and the company isn't doing anything about it yet.

The keylogger was discovered by security company modzero AG in an audio driver installed on HP systems. modzero did the responsible thing and made HP aware of its existence. HP Enterprise refused to take responsibility while HP Inc. and the other company involved, Conexant Systems Inc., are ignoring it. So modzero decided to go public "in accordance with out Responsible Disclosure process."

keylogger-discovered-in-hp-audio-driver photo 2

Here's where things get weird. Shipping a system with an active keylogger installed is only really ever going to happen for malicious reasons. But in this case it looks like pure negligence on the part of developers.

The software in question is part of a driver package offered by HP (since Christmas 2015) and related to audio chips manufactured by Conexant. Conexant's integrated circuits appear on numerous sound cards for which they provide drivers. In this case, special key presses are supported for functions such as turning the microphone and recording LED on or off.

Related

  • HP Creates Security Web Series Starring Christian SlaterHP Creates Security Web Series Starring Christian Slater

modzero discovered that the software written to detect these special key presses actually records all key presses and stores them in the following plain text log file: C:\Users\Public\MicTray.log for anyone to view. The log is overwritten every time you log back into the computer, but during use it is always recording key presses, which will include any and all passwords entered.

Negligent? Lazy? Call it what you will, but logging all key presses just to detect special key presses is ridiculous. As mentioned above, you can stop it happening by renaming the executable file, however, doing so will stop the special key functionality working. Ideally, HP and Conexant take notice now and fix the problem!

Recommended stories

Relax Keylogger Discovered in HP Audio Driver stories

Russia-Linked Hackers Target French Election

The hacking group, known variously as Fancy Bear or Pawn Storm, uses sophisticated phishing attempts and targets victims seen as at odds with Russian interests, Trend Micro reports.

Chrome Blocks Crafty URL Phishing Method

By using non-Latin Unicode characters, it's theoretically possible to register a domain name for a phishing website that looks nearly identical to the one it's trying to spoof.

More stories

The Best Identity Management Solutions of 2017

We test the top Identity-Management-as-a-Service (IDaaS) solutions so you can find the best one to easily create and manage users across your company's entire portfolio of cloud-based apps.