/?pid=14291

Updated:06:27 PM EST Jan 12


this is ggmania.com subsite Unpatchable USB malware is now in the wild - TechAmok

Unpatchable USB malware is now in the wild - [security]
11:25 AM EDT - Oct,03 2014 - (1 comments)

Wired is reporting that a software hack, aimed at rewriting a USB stick's firmware, is now in wild. The code comes directly from security researchers who believed publishing the info was the only way to force companies into taking action and fixing the problem. According to them high-level agencies like the NSA might have already had access to such code and they may already be exploiting this vulnerability. However, now that everyone knows about it companies will be forced to take action. But what's so bad about this, you might be asking yourselves. After all it's only a USB stick how much harm could it do? Unfortunately the answer is a lot. An attack using this technique, called BadUSB was demonstrated by a security researcher.

By connecting a corrupted stick to a PC he was then able to inject keystrokes, hide malware inside the stick's firmware, inject executables, and possibly spread the corruption further to other USB devices. And the worst part of this whole thing, is that due to the way the infection spreads and operates, infected devices are almost undetectable and unpatchable. And it could all blow up in an epidemic-style spreading pattern that could quickly engulf the whole digital world. If this sounds scary that's because it is. We live in an ever-more tightly connected world, where our devices and the internet have become the lifeline to our society. As such, thinking about security should always be a top priority, not an afterthought imposed by scandals and disasters.

last 10 comments:

(11:06 AM EDT - Oct,04 2014) - admin
quote:

I make a living designing and selling USB controllers and I can say
this article is very sensationalist and it is only telling a half-truth.
Yes, some USB devices rely on firmware for fundamental operation and
yes, the device firmware of *SOME* USB devices can be field-upgraded or
otherwise updated, but to claim that USB itself is fundamentally broken
due to this limited attack vector is nonsense.

There are three things that make this attack very specific and difficult to execute:

1)
Most USB device controllers are ASIC's, or Application Specific
Integrated Circuits. They are usually highly optimized to perform their
intended function very well, and they usually do not have extensibility
to become other devices. For example, one of my company's products is a
USB 3.0 to SATA Bridge, which is used in USB 3.0 external drives. Our
USB 3.0 to SATA bridge contains USB endpoints for USB Mass Storage Class
and that's it. Even if you re-programmed our device firmware, all it
could be is a USB Mass Storage Class device since the USB endpoint
number and types are fixed in hardware. We did this to make the chip as
lean as possible. It is impossible to program our chip to become a
functional networking controller or a keyboard device since we don't
support those features on the silicon.

>>>> Not All
USB Devices can be infected! Even if you managed to infect the device,
chances are you'd brick it rather than make it into something malicious.
Manufacturers are usually cost sensitive and they find ways to trim
costs everywhere they can ~ releasing general-purpose controllers for
commodity devices is, by definition, wasteful.

2) Device
manufacturers are generally very protective of their device firmwares,
since the device firmwares usually contain stuff device manufacturers
don't want other people to know about such as work-arounds for bugs in
the silicon, or proprietary algorithms which may enhance performance or
reliability, etc. The source code for most device firmwares are never
published, and even if they are, there is very little documentation or
active support. Finally, device manufacturers often have at least
rudimentary checks in place within their controllers to check if the
firmware is "valid" though these checks can vary between cryptographic
hashing to simple checksums to length checks.

>>>>>
Getting access to and mucking around with a device's firmware is hard.
Many ASICs use customized MCU cores and without published
register/programming guides, it is very difficult to reverse-engineer.

3)
Assuming that you've found a USB device controller that for some reason
can be programmed arbitrarily to support other USB classes and
endpoints and assuming again you found the firmware source code or
otherwise reverse-engineered the device's firmware, you still need to be
able to program the device. The vast majority of USB 2.0 and 1.1
devices have fixed firmwares that cannot be updated. The firmware code
is often stored on a metal layer in the silicon itself, and there is no
way for it to be changed. If the firmware is stored on an external
memory device, you still need to find a method to reprogram it, either
using (undocumented) vendor commands or using a dedicated hardware.

>>>>>
Most USB device controllers don't support being reprogrammed at all,
even if they run on firmware. Some ASIC's don't have an MCU and instead
rely purely on a logical state machine so that entire subclass is
immune. Many IC's have a MASK ROM such that the firmware program is
stored in some type of unwritable read-only medium and they are totally
immune to this attack as well.

Add your comment (free registrationrequired)

Short overview of recent news articles

Jan,12 2026 Lee Cronin's The Mummy - Official Teaser Trailer (2026) Jack
Jan,12 2026 Ferrari SF90 XX v Xiaomi SU7 Ultra: DRAG RACE
Jan,10 2026 Welcome to the Wasteland - Fallout (American TV series) fan video
Jan,09 2026 GOOD LUCK, HAVE FUN, DON'T DIE Trailer 2 (2026) Sam Rockwell
Jan,07 2026 NVIDIA Releases GeForce 591.74 WHQL Drivers with DLSS 4.5 Support
Jan,07 2026 Predator: Badlands Exclusive Deleted Scene (2025)
Jan,06 2026 Greenland 2: Migration - Official Trailer 3 (2026) Gerard Butler,
Jan,05 2026 The Best Laptops of 2025 - For Gaming, Creators & Students!
Jan,05 2026 Punkt Updates its Privacy-Focused Smartphone
Jan,05 2026 Clicks Launches New Ways to Add a Physical Keyboard to Your Life
Jan,05 2026 Building a PC for the First Time
Jan,03 2026 Building a PC in 2026
Jan,02 2026 I want this phone so bad... - Samsung Galaxy Z TriFold
Jan,02 2026 The Real Finewine Strikes Again: Ryzen 5600X, 5700X & 5800XT Revisit
Jan,02 2026 Nokia N8 Symbian Re-Awakened With Passion
Jan,02 2026 Europe Forces Apple to Open up More of iOS
Jan,02 2026 Must have Privacy and Security Tweaks: 2026 Edition
Jan,01 2026 How Did RAM Get So Expensive?!
Dec,31 2025 GeForce RTX 5090 prices to soar to $5,000 as NVIDIA and AMD prep GPU
Dec,30 2025 Hacker arrested for KMSAuto malware campaign with 2.8 million
Dec,29 2025 Killer Whale - Official Trailer (2026) Virginia Gardner, Mel
Dec,28 2025 NVIDIA Showed Me Their Supercomputer
Dec,28 2025 2026 CPU Launches! AMD, Intel & NVIDIA: Buy Now or Wait?
Dec,27 2025 Disable this Windows Feature that Secretly Eats Up RAM!
Dec,27 2025 New Windows 11 vs Old Malware: Will it survive?
Dec,27 2025 Samsung TriFold Durability Test: We found the limit
Dec,26 2025 TRUST WALLET CONFIRMS SECURITY BREACH
Dec,26 2025 Xiaomi 17 Ultra Leads And Samsung To Follow With A 10 Percent Price
Dec,25 2025 Merry Christmas Gaming Insanity
Dec,24 2025 Battlefield 6 - Official PS5 Features Trailer
Dec,24 2025 NVIDIA GeForce Hotfix Driver 591.67 Released
Dec,23 2025 Finally! A Battery That's Better Than Energizer and Duracell!
Dec,22 2025 NVIDIA Killing Cheap 16GB Local AI GPUs?
Dec,21 2025 Top 10 Movie Sequels of All Time
Dec,21 2025 He Built a Privacy Tool. Now He's Going to Prison (Kone Rodriguez,
Dec,20 2025 Insane Moves! B-Boy Shigekix vs. B-Boy Issin - Red Bull BC One World
Dec,20 2025 9800X3D & RTX 5070 Ti Gaming PC - MSI Project Zero Done Right
Dec,19 2025 The XG27AQWMG Sets a New Standard for 1440p OLED
Dec,19 2025 OnePlus 15R Boasts Huge 7,400 mAh Battery
Dec,19 2025 Motorola Refreshes moto g power for 2026
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs