Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

steve2470

(37,457 posts)
Fri Aug 1, 2014, 10:09 AM Aug 2014

Why the Security of USB Is Fundamentally Broken

http://www.wired.com/2014/07/usb-security/


Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t just in what they carry, it’s built into the core of how they work.

That’s the takeaway from findings security researchers Karsten Nohl and Jakob Lell plan to present next week, demonstrating a collection of proof-of-concept malicious software that highlights how the security of USB devices has long been fundamentally broken. The malware they created, called BadUSB, can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic. Because BadUSB resides not in the flash memory storage of USB devices, but in the firmware that controls their basic functions, the attack code can remain hidden long after the contents of the device’s memory would appear to the average user to be deleted. And the two researchers say there’s no easy fix: The kind of compromise they’re demonstrating is nearly impossible to counter without banning the sharing of USB devices or filling your port with superglue.

“These problems can’t be patched,” says Nohl, who will join Lell in presenting the research at the Black Hat security conference in Las Vegas. “We’re exploiting the very way that USB is designed.”

‘In this new way of thinking, you have to consider a USB infected and throw it away as soon as it touches a non-trusted computer.’

more at link above
4 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Why the Security of USB Is Fundamentally Broken (Original Post) steve2470 Aug 2014 OP
Greaat Erich Bloodaxe BSN Aug 2014 #1
Answer - nonupgradable hardware IDemo Aug 2014 #2
Sure, but then the price goes up. TM99 Aug 2014 #3
Probably not by all that much if security is an issue IDemo Aug 2014 #4

Erich Bloodaxe BSN

(14,733 posts)
1. Greaat
Fri Aug 1, 2014, 10:19 AM
Aug 2014

If hackers start exploiting this, you won't ever be able to trust those open bins of usb sticks at computer stores. They'll insert malware-inserted sticks into the bins, and simply let unaware users buy them and use them.

You'll only ever be able to (somewhat) trust sticks that are in those hard-shell cases straight from the manufacturer.

IDemo

(16,926 posts)
2. Answer - nonupgradable hardware
Fri Aug 1, 2014, 10:41 AM
Aug 2014

The current products very likely use something such as NOR flash memory which allows for erase and write operations to enable firmware upgrades. That, or a protected area of the NAND flash memory used to store user files. Using a separate write-once type of chip technology (programmable read-only memory) would prevent the device from being hacked by all but someone with the technical chops to replace the chip with a BGA rework station.

 

TM99

(8,352 posts)
3. Sure, but then the price goes up.
Fri Aug 1, 2014, 11:32 AM
Aug 2014

USB has become the new floppy. Numerous viruses were transmitted by floppy long before CD's and USB became common. Nothing will ever be 100% secure. It is an ever moving target.

IDemo

(16,926 posts)
4. Probably not by all that much if security is an issue
Fri Aug 1, 2014, 11:46 AM
Aug 2014

OTP's are a mature technology and aren't all that expensive. If having your firmware potentially exposed to malicious writes by parking it on NOR or NAND flash is the only alternative, I would think most would be willing to safeguard their private data. The only downside - no upgrades for your thumb drive's firmware, but when was the last time you did that?

Latest Discussions»General Discussion»Why the Security of USB I...