Lighthouse Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in Security

BadUSB: Theoretical Malware Turned Reality

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

Adam Caudill and Brandon Wilson, hackers at the Derbycon conference, have found their own way to take advantage of the USB firmware. They have reverse-engineered the firmware used by Nohl, and posted the code publicly on Github. Why would they do this? The answer is simple: It's a challenge; an ultimatum to USB manufacturers. Either the makers of USB technology must resolve the issue, or let every single user of USB devices stay vulnerable to the threat.

It's a bold attempt at opening the eyes of the bigwigs in the technology industry. Nohl, who previously discovered the USB vulnerabilities, refrained from posting how to exploit the devices because he thought the vulnerability was unpatchable. By posting the code where hackers can get to it, Caudill and Wilson are hoping that the code can be studied and protected against. In an interview with WIRED magazine, Caudill states:

If the only people who can do this are those with significant budgets, the manufacturers will never do anything about it. You have to prove to the world that it's practical, that anyone can do it...That puts pressure on the manufactures to fix the real issue.

USB firmware can be reprogrammed and used to perform illicit activities. For example, the security professionals were able to make the infected USB device appear as a keyboard, and then use it to type keystrokes on another machine. Because it's the firmware inside the USB device that's altered, it's difficult to fix.

A patch won't work because the problem isn't in the device's software, and files that hold malicious activity within the firmware can easily be deleted, hidden, or possibly even disable the USB's security functions. Caudill describes USBs as more than storage devices; in fact, he says, "[People] don't realize there's a reprogrammable computer in their hands."

In order to fix this vulnerability, manufacturers have to completely change the architecture of the USB device to make accessing the code inside the device impossible. According to Nohl, assuming that the problem is resolved, it would take up to 10 years for problems concerning the current USB standard to dissolve. In the meantime, here are a few tips to help keep yourself safe from the USB-transmitted disease:

  • Only allow trusted USB devices to connect to your PC. Don't let strangers charge their phones with your computer. Don't borrow someone else's USB device to move files from one PC to another. You're better off purchasing a new device and using it yourself.
  • Keep your eyes on your PC, especially in public places. Obviously, you shouldn't leave your computer lying around in the open where anyone could walk up and plug in a USB drive containing the malware.
  • Stay away from USB technology in general. This likely isn't an option, but it's the only way to truly keep yourself safe from the USB bug. Even devices like wireless mouses and keyboards can potentially hold the malware. Use wired mouses and keyboards, and transfer files using cloud services if you must.

Do you think that Caudill and Wilson did the right thing by releasing the code for BadUSB, or do you think they've unleashed a monster upon the world? Let us know in the comments.

Tagged in: Malware Security USB

With over 15 users experience of providing IT solutions and advice. Mixing innovations in technlogy with clients requirements is rewarding and inspiring when we sit down to measure the results.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 12 December 2019

EasyBlog Latest Blogs

Things That Go Bump in the Server Closet
Miscellaneous
Halloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodc...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Lighthouse Technology Solutions!

Read more...

Contact Us

Learn more about what Lighthouse Technology Solutions can do for your business.

callphone

Call us today
703-533-LTSI (5874)

119 Lounsbury Place
Falls Church, Virginia 22046