‘BadUSB’ malware lives in USB firmware to remain undetected, unfixable

A pair of researchers has discovered a flaw in the USB protocol’s basic architecture that allows for malware to be programed into a device’s firmware, making it nearly undetectable and impossible to patch.

To demonstrate the ubiquitous vulnerability, SR Labs security researchers Karsten Nohl and Jakob Lell created a proof-of-concept called “BadUSB” that can be installed on any universal serial bus device, including memory sticks, keyboards, smartphones and more, to take over a victim’s PC, insert or change files, modify DNS settings and otherwise play havoc with host hardware, reports Wired.

BadUSB is not a common piece of malware that can simply be copied onto a USB drive’s flash memory. Nohl and Lell reverse engineered the standard USB firmware in charge of transporting files on and off a device, finding that malicious code can be inserted and hidden within through a bit of reprograming.

“These problems can’t be patched,” Nohl said. “We’re exploiting the very way that USB is designed.”

Unless the tainted firmware is itself reverse engineered, the malware is protected from being discovered and will remain on a device even after a disk erasure is performed, a routine process for clearing suspected malicious software.

Further, BadUSB is bidirectional. In other words, if a malware’s payload is coded to do so, a thumb drive can infect a computer’s USB firmware, which in turn reprograms the firmware of yet another connected USB device, spreading the code silently across any and all systems. In testing, Nohl and Lell found that basically any USB device is vulnerable to the exploit.

As there is no easy fix to malware like BadUSB, the researchers suggest users adopt a new way of thinking about USB hardware. Instead of thoughtlessly transporting files and other data back and forth between machines, Nohl and Lell recommend connecting only to known devices that are user-owned or trusted.

“In this new way of thinking, you can’t trust a USB just because its storage doesn’t contain a virus. Trust must come from the fact that no one malicious has ever touched it,” Nohl said. “You have to consider a USB infected and throw it away as soon as it touches a non-trusted computer.”

Nohl and Lell will present their findings, as well as proof-of-concept software, at the Black Hat conference in Las Vegas this August.

Advertisements

About contra

Film maker. Video game historian. Will put more in here this section soon!
This entry was posted in technology and tagged , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s