Announcement

Collapse
No announcement yet.

USB drive security risks

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    USB drive security risks

    USB flash drives have always been a malware risk. (Heck there's even a "House of Cards" plotline that revolves around USB drive-based hacking.)

    A new article describes how the ante has been increased for the capability of maliciously-crafted USB drives to wreak havoc on a system. See

    http://www.cio.co.nz/article/556626/...y-researchers/

    Current versions of KDE / Kubuntu require superuser status to login to connected hard drives. Is this also true for USB drives?

    What security features are in KDE / Kubuntu to restrict usage of a USB drive?


    I did find this thread:

    http://www.linuxquestions.org/questi...nt-kde-891757/
    Last edited by perspectoff; Oct 07, 2014, 09:32 PM.

    UbuntuGuide/KubuntuGuide

    Right now the killer is being surrounded by a web of deduction, forensic science,
    and the latest in technology such as two-way radios and e-mail.

    #2
    The Verge, ever the source of unvarnished truth (*cough*), issued a hyperbolic screed about BadUSB yesterday. Originally titled "This published hack could be the beginning of the end for USB," it was softened a bit to "USB has a huge security problem that could take years to fix." Wired, somewhat unusually, offered their own breathless take in "The unpatchable malware that infects USBs is now on the loose." Is the sky truly falling? Are we mere moments away from returning to stone knives and bearskins?

    I would call your attention to the comments in these articles. First, by Quietnine at the Verge article:

    This article is blown out of proportion. The information that Nohl’s research (and thus, this entire article and Wired’s identical article) was based on has all been debunked. Yes, there are some devices that can be infected, but its a very small percent. Most USB devices use (ASIC) Application Specific Integrated Circuits, which basically means they can’t be repurposed to be a different type of controller (eg. use malware to turn USB flashdrive into a NIC and gain network access), and attempts to do so would brick the device, so there goes most of your USB devices right there. On top of that, most USB devices can’t even update their firmware, because firmware is hardcoded into the metal layer of the silicon. But suppose you found a rare device that has re-writable firmware (usb 3.0, and incredibly rare 2.0), AND you have the hardware support to access it, AND you have the understanding to reverse engineer what it does, AND its not an ASIC device? Guess what, its still going to perform hash verification of the firmware after you plug it in to make sure the firmware installed properly, and if you’ve replaced the firmware with malware or set you malware up to piggyback on the install its going to fail hash verification and the device will prompt you for a firmware update that overwrites your bogus code.

    All of Nohl’s research used USB devices from one specific company, Phison Electronics, that is basically a special unicorn that adheres to none of the USB norms. Don’t lose sleep over this.
    The Wired article contains a comment by Andromeda which itself is a repost of a comment by someone else on an earlier Wired article:

    Nohl's research has some serious holes in it. This attack vector, while possible, is incredibly narrow, and any attempt to paint BadUSB as a serious threat is basically FUD. This is a repost of Clandestine Moniker's response to the last BadUSB article wired decided to scare the masses with:
    _____________________________________

    I make a living designing and selling USB controllers and I can say this article is very sensationalist and it is only telling a half-truth. Yes, some USB devices rely on firmware for fundamental operation and yes, the device firmware of *SOME* USB devices can be field-upgraded or otherwise updated, but to claim that USB itself is fundamentally broken due to this limited attack vector is nonsense.

    There are three things that make this attack very specific and difficult to execute:

    1) Most USB device controllers are ASIC's, or Application Specific Integrated Circuits. They are usually highly optimized to perform their intended function very well, and they usually do not have extensibility to become other devices. For example, one of my company's products is a USB 3.0 to SATA Bridge, which is used in USB 3.0 external drives. Our USB 3.0 to SATA bridge contains USB endpoints for USB Mass Storage Class and that's it. Even if you re-programmed our device firmware, all it could be is a USB Mass Storage Class device since the USB endpoint number and types are fixed in hardware. We did this to make the chip as lean as possible. It is impossible to program our chip to become a functional networking controller or a keyboard device since we don't support those features on the silicon.

    Not All USB Devices can be infected! Even if you managed to infect the device, chances are you'd brick it rather than make it into something malicious. Manufacturers are usually cost sensitive and they find ways to trim costs everywhere they can -- releasing general-purpose controllers for commodity devices is, by definition, wasteful.

    2) Device manufacturers are generally very protective of their device firmwares, since the device firmwares usually contain stuff device manufacturers don't want other people to know about such as work-arounds for bugs in the silicon, or proprietary algorithms which may enhance performance or reliability, etc. The source code for most device firmwares are never published, and even if they are, there is very little documentation or active support. Finally, device manufacturers often have at least rudimentary checks in place within their controllers to check if the firmware is "valid" though these checks can vary between cryptographic hashing to simple checksums to length checks.

    Getting access to and mucking around with a device's firmware is hard. Many ASICs use customized MCU cores and without published register/programming guides, it is very difficult to reverse-engineer.

    3) Assuming that you've found a USB device controller that for some reason can be programmed arbitrarily to support other USB classes and endpoints and assuming again you found the firmware source code or otherwise reverse-engineered the device's firmware, you still need to be able to program the device. The vast majority of USB 2.0 and 1.1 devices have fixed firmwares that cannot be updated. The firmware code is often stored on a metal layer in the silicon itself, and there is no way for it to be changed. If the firmware is stored on an external memory device, you still need to find a method to reprogram it, either using (undocumented) vendor commands or using a dedicated hardware.

    Most USB device controllers don't support being reprogrammed at all, even if they run on firmware. Some ASIC's don't have an MCU and instead rely purely on a logical state machine so that entire subclass is immune. Many IC's have a MASK ROM such that the firmware program is stored in some type of unwritable read-only medium and they are totally immune to this attack as well.
    Someone questions Andromeda's post with a bad analogy, and Andromeda handily shreds it:

    1) It is not my profession, its Clandestine Moniker's profession, whose post I am quoting from the last BadUSB article (as mentioned at the top of my post). My profession is as a computer scientist that specializes in malware reverse engineering, computer forensics and cyber intrusion, and I can confirm that Clandestine's points are accurate.

    2) Your analogy is off. It is impossible to use the BadUSB vulnerability in 99.9999+% of USB devices. A better analogy would be to say 99.9999% of people are immune to Polio thanks to vaccinations, therefore it is unlikely that Polio would ever be the payload of a terrorists biological attack. Likewise, because so few devices are vulnerable to this exploit it is highly unlikely that a hacker would ever attempt to use it.

    3) Should standards require manufacturers to prevent this kind of attack? Possibly. But the nature of vulnerabilities is that they are often unforseen, and its difficult to pass any legislation let alone legislation that tries to speculate about future vulnerabilities and has zero potential profit for the politicians. So requirements that prevent bad design while useful might not be practical to apply.

    4) The author's point is that there is a widespread USB vulnerability and now people are writing code to exploit it. But he's wrong: It's not widespread. It's one company whose devices amount to a very small percentage of total devices. The more appropriate thing to do would be to shame the company hard in the headlines so they stop producing vulnerable crap, but, its more profitable for wired to make a sensational we're-all-going-to-die article.
    In short: nothing to see here, move along. When The Verge says "In the meantime, any time you plug a USB drive into your computer, you'll be opening up a huge vector of attack," they're spreading the foulest form of bullshopt FUD one can stumble across.
    Last edited by SteveRiley; Oct 03, 2014, 10:58 PM.

    Comment


      #3
      PS I take care of two polio patients currently. I have no idea how they got it. I, like many, had thought polio had been eradicated. (To be fair, both patients are elderly and may have acquired the disease long ago.)

      I think there's now a Spanish nurse with Ebola. No one knows how that was acquired, either.

      There is a saying in the medical profession:

      "if the risk is low but the consequences severe, vigilance and prevention are warranted, just as for common problems with lower severity."

      Today I bought a USB male to male cable. Guess what? Embedded in the cable itself were 4 programs (two Mac apps and two Windows apps). None were required for the cable to function. I initially thought they were and ran them (after scanning with an anti-virus program).

      I can't believe how easy it is EVEN IN A CABLE to embed programs. The "Internet of Things" indeed.

      Security is paramount and guessing about your risk benefits no one. Just ask Edward Snowden, Mark Klein, Joe Weiss, and Richard Clark. (... unless you've been under a rock for 10 years and never heard of those characters, of course.)
      Last edited by perspectoff; Oct 07, 2014, 09:29 PM.

      UbuntuGuide/KubuntuGuide

      Right now the killer is being surrounded by a web of deduction, forensic science,
      and the latest in technology such as two-way radios and e-mail.

      Comment


        #4
        Originally posted by perspectoff View Post
        Embedded in the cable itself were 4 programs (two Mac apps and two Windows apps). None were required for the cable to function.
        What Really? This is quite disturbing. How did you discover the programs?

        Comment

        Working...
        X