Are Hardware KVMs the Next Big Blind Spot in Digital Forensics??
JetKVM: A $70 hardware KVM device that grants anyone full remote control of a computer-even when powered off or locked-via HDMI/USB emulation. No host software. No traditional forensic traces. Just pure hardware-level access.
https://github.com/jetkvm/kvm.git
https://www.kickstarter.com/projects/jetkvm/jetkvm
When Your Keyboard Is the Attacker
A Forensics Wake-Up Call!!
Invisible to EDR/XDR: Operates as a “Dell Monitor” or “Logitech Keyboard” in registry entries blend with legitimate hardware
Zero Memory Footprint: Leaves no process/network artifacts (unlike RDP/VNC)
The Forensic Blind Spot
- Registry Traces: Spoofed vendor IDs in
HKLM\SYSTEM\CurrentControlSet\Enum\USB
may be your only lead Network Red Flags:
No trace
on the host machine as the device uses seperateLAN
- Physical Evasion: Smaller than a keylogger and hides behind monitor cables
💡 Analyst Challenge:
How do you detect ?!
Our Observatiosn on Jet-KVM
After purchasing and testing JetKVM for forensic analysis, here’s what we discovered:
- Fully Customizable Device Identity
JetKVM appears to the system as just another external monitor or keyboard. Even more concerning, you can customize the device name, serial number, and other identifiers — so it could show up as “Dell Monitor,” “Logitech Keyboard,” or virtually anything you want in system registries and device managers. Persistence Across Reboots and BIOS Access
Remote control via JetKVM persists even after a system reboot and is available during BIOS/UEFI setup. The device acts exactly like a local keyboard and monitor, allowing an attacker to change BIOS settings or boot order — no operating system needed.- EDID Cloning for Perfect Disguise
We took it a step further: by extracting and decoding the EDID (Extended Display Identification Data) from the host machine’s built-in display, converting it to hex, and uploading it to the JetKVM dashboard, we made JetKVM perfectly mimic the original display.
The system recognized it as the exact same built-in monitor, with matching name, serial number, vendor ID, and other attributes — making forensic differentiation nearly impossible.
Furthermore we tried to get the EDID of the built-in display and mimic and it perfectly worked out!!! as shwon in the screenshots below.—
The Forensic Blind Spot
- Registry Traces: Spoofed vendor IDs can only be found under
HKLM\SYSTEM\CurrentControlSet\Enum\USB
— and even then, they can be made to look legitimate. - Network Red Flags:
No trace
on the system as it connects with seperate LAN - Physical Evasion: The device is tiny and easily hides behind monitor cables or docks.
The Bigger Picture
This isn’t just about JetKVM-hardware-based threats are evolving. Think:
Offline data theft via rogue charging stations.
Supply chain attacks with pre-installed KVMs in “new” hardware.
⚠️ Call to Action:
- Share detection strategies-comment below if you’ve tackled similar threats!
🛡️ Special Thanks
This research wouldn’t have been possible without the amazing support of my friend Akhil Dara