Security researchers on Friday unveiled an open-source device that captures the traffic of a wide variety of wireless devices, including keyboards, medical devices, and remote controls.
Keykeriki version 2 captures the entire data stream sent between wireless devices using a popular series of chips made by Norway-based Nordic Semiconductor. That includes the device addresses and the raw payload being sent between them. The open-source package was developed by researchers of Switzerland-based Dreamlab Technologies and includes complete software, firmware, and schematics for building the $100 sniffer.
Doesn't surprise me that something like this exists. I wonder how far a wireless keyboard's signal goes before it is unusable in this sort of attack. If I had to guess, I'd say the attacker would have to be within 50ft of you to do any damage.
Sniffers have been around for a while, there are rumors the spooks have some good to 300 feet, but those have been rather expense in the past. This kit and schematics for $100 means the kid next door might build one like we (older guys) used to do with Erector Sets or Heathkit gear. Because we could.