How to Update Your Logitech Unifying Receiver
Updating your Logitech unifying receiver to protect yourself from these attacks is relatively simple. Be sure to update it to the version released on or after August 2019 when Logitech released an additional patch.
Identifying If Your Logitech Dongle Is Vulnerable
When a Logitech device has an orange star printed on the side of the receiver, the device is vulnerable to hacks that allow attackers to take control of your computer. If you receiver doesn’t have this star, you’re probably safe, but it’s still always a best practice to keep all your software and firmware updated to prevent being exposed to potential threats.
How the Logitech Unifying Receiver Hack Works
The first hack was discovered in 2016 (called “MouseJack”), but the Logitech Unifying Receiver is still at risk. It lets anything sending out a signal pretending to be a wireless mouse to connect to the wireless mouse receiver (dongle) plugged into any computer. The dongle allows the new signal to connect to your computer, no questions asked, and a hacker can gain control of your computer—no matter what security systems you have in place.
More Risk for Wireless Devices
As security researchers looked into the vulnerability a little further, they discovered additional issues with these dongles. They discovered that attackers could monitor keyboard communication traffic, inject keystrokes through dongles not connected to a wireless keyboard, recover encryption keys, and take over your computer. Now it wasn’t just dongles being used, but even ones not plugged into a computer. The vulnerability was present in all these dongles because of a single wireless chip they use. In Logitech’s case, their unifying technology is a standard piece of technology they’ve been shipping with a wide array of Logitech wireless gear for nearly a decade.