Some HP laptops could have a dangerous keylogger

Security researchers discovered a potentially damaging software flaw.

Some of HP's leading laptops may have shipped carrying a keylogger, researchers have revealed. 

Experts from Switzerland-based security consulting firm Modero have released a report stating that more than two dozen HP laptop brands come with a problematic audio device driver. 

The driver has a component named MicTray64.exe, which allows the driver to respond when certain keys on the keyboard are pressed.  However, it also logs all of the keys pressed, and sends them – unencrypted – to a debugging interface, or writes them down on the C drive. The log file, which can be found on this location - C:\Users\Public\MicTray.log (if you have an HP laptop) and gets rewritten every time the machine is rebooted, but there are ways it could stay unaltered for weeks, months even. 

"This type of debugging turns the audio driver effectively into keylogging spyware," modzero researchers wrote. "On the basis of meta-information of the files, this keylogger has already existed on HP computers since at least Christmas 2015." 

“There is no evidence that this keylogger has been intentionally implemented. Obviously, it is a negligence of the developers - which makes the software no less harmful. If the developer would just disable all logging, using debug-logs only in the development environment, there wouldn't be problems with the confidentiality of the data of any user.” 

Following the announcement, HP was quick to reach out to ITProPortal, saying it had no access to customer data, and that a fix will be available soon:

"HP is committed to the security and privacy of its customers and we are aware of the keylogger issue on select HP PCs. HP has no access to customer data as a result of this issue. Our supplier partner developed software to test audio functionality prior to product launch and it should not have been included in the final shipped version. Fixes will be available shortly via HP.com."

The exact technical details and documents can be found in modzero’s Security Advisory

Image Credit: Elena11 / Shutterstock