Jump to content
Nytro

BadUSB the unpatchable malware code published on Github

Recommended Posts

BadUSB the unpatchable malware code published on Github

0 By Vijay on October 3, 2014 ·

BadUSB : The unpatchable and unfixable USB malware

Exactly two months after researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas. The BadUSB was later demonstrated again by two researchers, Adam Caudill and Brandon Wilson. Caudill and Wilson presented the vulnerability at Derbycon 4.0 conference last week in Louisville.

What is BadUSB?

The malware which is dubbed BadUSB, reprograms embedded firmware to give USB devices new, covert and most powerful capabilities. In a demo at Black Hat security conference in Las Vegas, a USB drive was infected and showed its ability to act as a keyboard that surreptitiously types malicious commands into attached computers.

Another USB was similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The demo showed that similar hacks could work against Android phones when attached to targeted computers. The malware is so huge that it can work on almost any USB linked devices like Web cams, keyboards, smart phones etc.

BadUSB on Github

Researchers Wilson and Caudill reversed-engineered USB firmware and reprogrammed it to launch various attacks. They then put the code for BadUSB on Github with a intent of letting all the users know abouts its effects.

“The belief we have is that all of this should be public. It shouldn’t be held back. So we’re releasing everything we’ve got,” Caudill told the Derbycon audience on Friday. “This was largely inspired by the fact that [sR Labs] didn’t release their material. If you’re going to prove that there’s a flaw, you need to release the material so people can defend against it.”

Caudill and Wilson discussed various scenarios where BadUSB can be used. Prominent among them and most deadliest is the USB device to emulate a keyboard and issue commands on behalf of a logged-in user to exfiltrate data or install malware.

Unpatchable!!!

BadUSB remains unpatchable at the moment. The reason according to the both the researchers, is that the USB controller chips in peripherals can be reprogrammed to spoof other devices and there’s little or no protection to prevent anyone from doing so. They also feel that since USBs are mass manufactured these days and it proves that anyone can input the code to insert the malware and take command of any system, perhaps the USB manufacturers will be under pressure to fix it soon.

“If the only people who can do this are those with significant budgets, the manufacturers will never do anything about it,” Caudill told Wired. “You have to prove to the world that it’s practical, that anyone can do it…That puts pressure on the manufactures to fix the real issue.”

The researchers also hope that putting teh code on Github would encourage companies and white hat researchers to find a fix for the malware.

Sursa: BadUSB the unpatchable malware code published on Github

Link to comment
Share on other sites

Nohl and Lell did not publish their code, for fear that it would be used for nefarious purposes.

Caudill’s statement highlights a philosophical split among security researchers: those who elect to keep the flaws they find under wraps in order to protect the public directly, and others, who believe publishing their software exploits is the best way to put pressure on the industry to fix security flaws quickly.

Because the malware is stored on the device’s firmware, which controls the basic functionality of the device, it’s very difficult to detect and can’t even be deleted by clearing the storage contents.

Your computer is still vulnerable, especially if you swap files with other users or happen to pick up a new free thumb drive at a business conference.

In order to mitigate against these types of attacks, said Nohl, the entire security architecture would have to be rebuilt from the ground up with code that cannot be changed without the manufacturer’s signature. Even then, he said, it could take more than a decade to get rid of vulnerable devices and smooth out all the new bugs.

Link to comment
Share on other sites

mai pe romaneste: Este vorba de fapt de controllerul stickurilor si de faptul ca il poti accesa cu un simplu tool,putand sa modifici si chiar sa plantezi ceva bucurii care sa se execute la conectarea la pc (fara a avea vreo treaba cu autorun)

Also,in acel ''kit'' e vorba de chipuri Phison, folosite in unele stickuri Verbatim,Silicon Power si posibil Apacer (din marcile cunoscute).Asta inseamna ca pentur aproape orice alt chip poate fi adaptata metoda(cele mai multe stickuri ieftine folosesc chip de la Chipsbank - CBM209x)

Se pare ca Kingston DT microDUO foloseste chipuri Phison 2251

Poza random cu un stick care foloseste chip Chipsbank

3094522.jpg

May be usefull:

flashboot.ru , usbdev.ru

Edited by LLegoLLaS
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...