[OPLIN 4cast] OPLIN 4cast #397: BadUSB
Editor
editor at oplin.org
Wed Aug 6 10:30:13 EDT 2014
OPLIN 4Cast
Email not displaying correctly? View it in your browser.
<http://www.oplin.org/4cast/>
OPLIN 4Cast
OPLIN 4cast #397: BadUSB
August 6th, 2014
USB driveAs if you needed something else to worry about, there seems to
be a strong possibility that USB devices can be used in new and nasty
ways to damage computers, such as the public computers in libraries.
Security researchers Karsten Nohl and Jakob Lell are giving a briefing
tomorrow about "BadUSB-on accessories that turn evil" at the Black Hat
<https://www.blackhat.com/us-14/briefings.html> convention in Las Vegas.
Their presentation has already received a lot of attention because they
have found a way to reprogram the controller chip in a USB thumb drive
so it acts like a different USB device, perhaps a keyboard or network
card. And there doesn't seem to be any easy way (yet) to protect your
computers.
* Why the security of USB is fundamentally broken
<http://www.wired.com/2014/07/usb-security/> (Wired | Andy
Greenberg) "The malware they created, called BadUSB, can be
installed on a USB device to completely take over a PC, invisibly
alter files installed from the memory stick, or even redirect the
user's internet traffic. Because BadUSB resides not in the flash
memory storage of USB devices, but in the firmware that controls
their basic functions, the attack code can remain hidden long after
the contents of the device's memory would appear to the average user
to be deleted."
* Researchers warn about 'BadUSB' exploit
<http://www.pcmag.com/article2/0,2817,2461717,00.asp> (PC Mag |
David Murphy) "A device could, for example, emulate a USB-connected
keyboard and automatically send over all sorts of keystrokes that,
when combined, could lead to issues-installing malware, wiping key
files off a drive, copying files over to the USB device, etc. And
that's just the first example. SRLabs notes that a USB-connected
device could also pretend that it's a network card and redirect the
traffic to and from a system through a rogue DNS server. Or, better
yet, it could infect that system with a boot-sector virus that could
be a bit tougher to detect and remove than your average infection."
* BadUSB: Big, bad USB security problems ahead
<http://www.zdnet.com/badusb-big-bad-usb-security-problems-ahead-7000032211/>
(ZDNet | Steven J. Vaughan-Nichols) "The hackers claim that 'Simply
reinstalling the operating system - the standard response to
otherwise ineradicable malware - does not address BadUSB infections
at their root. The USB thumb drive, from which the operating system
is reinstalled, may already be infected, as may the hardwired webcam
or other USB components inside the computer. A BadUSB device may
even have replaced the computer's BIOS - again by emulating a
keyboard and unlocking a hidden file on the USB thumb drive.' In
short, 'Once infected, computers and their USB peripherals can never
be trusted again.'"
* Don't panic over the latest USB flaw
<http://www.tomsguide.com/us/badusb-dont-panic,news-19258.html>
(Tom's Guide | Marshall Honorof) "BadUSB is a proof-of-concept
attack, designed by security researchers. They're not going to
release it into the wild[...] Furthermore, demonstrating something
like BadUSB at a conference like Black Hat is basically an open
invitation for the security community to fix this vulnerability
before it becomes widespread."
*/Articles from Ohio Web Library <http://ohioweblibrary.org>:/*
* Auto, smartphone, point-of-sale (POS) system and airport security
hacks among first 100 talks chosen for Black Hat USA 2014
<http://web.b.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=74f41cbf-334b-4dbc-b939-c06e0948790d%40sessionmgr111&vid=0&hid=103&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bwh&AN=201405291200PR.NEWS.USPR.SF37647>.
(/PR Newswire US/, 05/29/2014)
* Thieves used USB sticks to infect ATMs, withdraw large amounts of
cash
<http://www.fofweb.com.proxy.oplin.org/Science/LowerFrame.asp?SID=5&iPin=UPI-1-20131230-184339-bc-germany-atmhack&rID=1&InputText=usb>.
(In /Science online/, United Press International, Dec. 30, 2013)
* Embedded devices gird up against cyber threats
<http://web.a.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=f944dd9b-f1d5-4ad4-bfdc-167a0bb52947%40sessionmgr4003&vid=0&hid=4209&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=cph&AN=88934227>.
(/Electronic Design/, 6/20/2013, p18-21 | Bill Wong)
------------------------------------------------------------------------
The */OPLIN 4cast/* is a weekly compilation of recent headlines, topics,
and trends that could impact public libraries. You can subscribe to it
in a variety of ways, such as:
* *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
subscribing to the following URL:
http://www.oplin.org/4cast/index.php/?feed=rss2.
* *Live Bookmark.* If you're using the Firefox web browser, you can go
to the 4cast website (http://www.oplin.org/4cast/) and click on the
orange "radio wave" icon on the right side of the address bar. In
Internet Explorer 7, click on the same icon to view or subscribe to
the 4cast RSS feed.
* *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
OPLINlist and OPLINtech) by subscribing to the 4cast mailing list at
http://mail.oplin.org/mailman/listinfo/OPLIN4cast.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20140806/fa1fd43a/attachment-0003.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: kubrickheader.jpg
Type: image/jpeg
Size: 38379 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20140806/fa1fd43a/attachment-0003.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: usb-drive.png
Type: image/png
Size: 14970 bytes
Desc: not available
URL: <http://lists.oplin.org/pipermail/oplin4cast/attachments/20140806/fa1fd43a/attachment-0003.png>
More information about the OPLIN4cast
mailing list