August 3, 2014
Carrying The Next Digital Epidemic: Why The Security Of A USB Device Is Fundamentally Broken — Next Big Digital Infection Vector?
http://www.fortunascorner.wordpress.com
Andy Greenberg had an online article (July 31, 2014) on the website Wired.com, “Why The Security Of A USB Device Is Fundamentally Broken,”. He writes that “computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections,” writes Mr. Greenberg, “we depend on antivirus scans and the occasional reformatting to keep our thumb-drives from becoming the carrier of the next digital epidemic. But, the security problems with USB devices run deeper than you think,” he says: “Their risk isn’t just what they carry, it’s built into the core of how they work.”
“That’s why the takeaway from the findings [cyber] security researchers Karsten Kohl and Jakob Lell plan to present next week,” [at the annual Black Hat Conference in Las Vegas] Mr. Greenberg notes, “demonstrating a proof-of-concept malicious software that highlights how the security of USB devices — has long been fundamentally broken.” “The malware the two created,” notes Mr. Greenberg, “called BadUSB, can be installed on a USB device to completely take over a PC, — invisibly alter files [already] installed from the memory stick; or, even redirect the user’s Internet traffic. Because BadUSB resides — not in the flash memory storage of USB devices; but, in firmware that controls their basic functions, the attack code can remain hidden long after the content’s of the device’s memory would appear to the average user — to have been deleted. And, the two researchers say there’s no easy fix: the kind of compromise they’re demonstrating is nearly impossible to counter — without banning the sharing of USB devices; or, filling your port with superglue.”
“These problems can’t be patched. We’re exploiting the very way the USB is designed,” said Nohl.
“In this new way of thinking, you have to consider a USB infected; and, throw it away — as soon as it touches a non-trusted computer.”
Nohl and Lell, “researchers [cyber security] for the security consultancy firm, SR Labs, are hardly the first to point out USB devices can store and spread malware. But, the two hackers didn’t merely copy their own custom-coded infections into USB devices’ memory.” The two researchers “spent months reverse engineering the firmware that runs in basic communications functions of USB devices,” Mr. Greenberg writes, “the controller chips that allow the devices to communicate with a PC; and, let users move files on, and off them.” “Their central finding is that USB firmware, which exists in varying forms for all USB devices, can be reprogrammed to hide attack code.” “You can give it to your IT security people, they can scan it, delete some files, and give it back to you — telling you that it’s clean,” said Nohl. “But, unless the IT guy has the reverse engineering skills to find, and analyze the firmware,” [highly doubtful in most cases] “the cleaning process doesn’t even touch the files we’re talking about.”
Carrying The Next Digital Epidemic: Why The Security Of A USB Device Is Fundamentally Broken — Next Big Digital Infection Vector?
http://www.fortunascorner.wordpress.com
Andy Greenberg had an online article (July 31, 2014) on the website Wired.com, “Why The Security Of A USB Device Is Fundamentally Broken,”. He writes that “computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections,” writes Mr. Greenberg, “we depend on antivirus scans and the occasional reformatting to keep our thumb-drives from becoming the carrier of the next digital epidemic. But, the security problems with USB devices run deeper than you think,” he says: “Their risk isn’t just what they carry, it’s built into the core of how they work.”
“That’s why the takeaway from the findings [cyber] security researchers Karsten Kohl and Jakob Lell plan to present next week,” [at the annual Black Hat Conference in Las Vegas] Mr. Greenberg notes, “demonstrating a proof-of-concept malicious software that highlights how the security of USB devices — has long been fundamentally broken.” “The malware the two created,” notes Mr. Greenberg, “called BadUSB, can be installed on a USB device to completely take over a PC, — invisibly alter files [already] installed from the memory stick; or, even redirect the user’s Internet traffic. Because BadUSB resides — not in the flash memory storage of USB devices; but, in firmware that controls their basic functions, the attack code can remain hidden long after the content’s of the device’s memory would appear to the average user — to have been deleted. And, the two researchers say there’s no easy fix: the kind of compromise they’re demonstrating is nearly impossible to counter — without banning the sharing of USB devices; or, filling your port with superglue.”
“These problems can’t be patched. We’re exploiting the very way the USB is designed,” said Nohl.
“In this new way of thinking, you have to consider a USB infected; and, throw it away — as soon as it touches a non-trusted computer.”
Nohl and Lell, “researchers [cyber security] for the security consultancy firm, SR Labs, are hardly the first to point out USB devices can store and spread malware. But, the two hackers didn’t merely copy their own custom-coded infections into USB devices’ memory.” The two researchers “spent months reverse engineering the firmware that runs in basic communications functions of USB devices,” Mr. Greenberg writes, “the controller chips that allow the devices to communicate with a PC; and, let users move files on, and off them.” “Their central finding is that USB firmware, which exists in varying forms for all USB devices, can be reprogrammed to hide attack code.” “You can give it to your IT security people, they can scan it, delete some files, and give it back to you — telling you that it’s clean,” said Nohl. “But, unless the IT guy has the reverse engineering skills to find, and analyze the firmware,” [highly doubtful in most cases] “the cleaning process doesn’t even touch the files we’re talking about.”