Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

Severe USB Vunerability

Comments

  • Registered Users, Registered Users 2 Posts: 6,393 ✭✭✭AnCatDubh


    "It’s basically like unprotected sex: If you plug your USB memory stick into another computer, you should then assume that your memory stick is forever compromised." - same story via extreme tech


  • Registered Users, Registered Users 2 Posts: 10,339 ✭✭✭✭LoLth


    hmmm not sure about "your own computer could infect USB firmware" as you surf the web. would separation of User/Root priviledges not take care of this? Or can you get firmware level access to a device as a standard user?

    I fully agree that this is a serious issue but, just like the USB autorun infections, this seems like its more of an issue for OSes (yes, this means windows primarily) that encourage ease of use by allowing users too many permissions. If anyone knows otherwise I'm happy to be corrected on this.


  • Registered Users, Registered Users 2 Posts: 10,339 ✭✭✭✭LoLth


    future solution: standards to designate "secure" firmware chipsets. Only signed chips are accepted and each device purpose has a signature unique to that particular device, so a USB thumbdrive has a storage signature and cannot be given a keyboard signature without invalidating the firmware/hardware relationship.

    as a happy aside, this unique signature could also aid law enforcement in tracking what systems different USB devices were plugged into. (beyond the current software signature found in windows registry hives).


  • Registered Users, Registered Users 2 Posts: 4,936 ✭✭✭skimpydoo


    Yeah I read about it here. It maybe scaremongering but still worth being prepared for.


  • Registered Users, Registered Users 2 Posts: 1,667 ✭✭✭Impetus




  • Advertisement
  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard


    Study: Firmware Plagued By Poor Encryption and Backdoors
    The first large-scale analysis of firmware has revealed poor security practices that could present opportunities for hackers probing the Internet of Things. Researchers with Eurecom, a technology-focused graduate school in France, developed a web crawler that plucked more than 30,000 firmware images from the websites of manufacturers including Siemens, Xerox, Bosch, Philips, D-Link, Samsung, LG and Belkin. In one instance, the researchers found a Linux kernel that was 10 years out of date bundled in a recently released firmware image. They also uncovered 41 digital certificates in firmware that were self-signed and contained a private RSA encryption key and 326 instances of terms that could indicate the presence of a backdoor.


  • Closed Accounts Posts: 1,260 ✭✭✭Rucking_Fetard




  • Registered Users, Registered Users 2 Posts: 4,331 ✭✭✭Keyzer



    Not the same as the two German researchers that presented at BlackHat but similar. Confirmed, its freely available on GitHub. Playing with it now...

    http://www.welivesecurity.com/2014/10/06/unpatchable-usb-exploit-posted-github/


Advertisement