'BadUSB' Security Threat Affects Billions of Devices and is Fundamentally Unfixable

Advertisement
By NDTV Correspondent | Updated: 3 October 2014 15:52 IST

We all use USB storage devices and accessories - in fact there are billions of them in the world right now, according to the USB Implementers Forum - and we take for granted that they'll just work when plugged in. Before the standard existed, plugging anything in to a PC usually involved shutting it down, restarting, and installing drivers.

This simplicity is achieved using microcontrollers in each USB device which negotiate connections with host PCs and tell both parties how to recognise each other. Now, nearly 20 years after the first USB devices became widespread, a lack of forethought about security in the original implementations of those controllers is being exploited.

Security researchers Adam Caudill and Brandon Wilson announced that they had reverse-engineered one widely used USB controller chip and demonstrated how they had been successful in reprogramming commonly available USB pen drives to behave in unexpected ways. Their methods can be expected to be replicated for malicious purposes since the two have released all their findings, including source code, to the public.

Advertisement

A previous report on the potential vulnerability, which has come to be known as BadUSB, was published earlier this year although no information was released that could have been used by attackers. Caudill and Wilson believe that the scale of the problem is so immense that the entire industry needs to be jolted into action, or nothing will be done about it. It is also possible that the flaw has been known to attackers (including government agencies) for a long time and has been exploited without anyone knowing. Forcing knowledge of BadUSB into the public domain will make potential victims aware of that possibility.

Advertisement

Terrifyingly, fixing the problem will require a completely new set of USB protocols and the scrapping of all devices that are currently in existence. People are so used to USB that they will not hesitate to plug in a storage device, keyboard, or any other product - even a smartphone. This complacence can be exploited by attackers, for example, by leaving a doctored pen drive lying around in public or giving thousands of them away for free in a promotion - no one would hesitate to plug it in.

Because the drive's firmware has been modified, formatting it won't do any good. Malware detection tools can only scan storage locations, not firmware. Experts citied by Wired estimate that it could take over a decade for a new, secure version of USB to become dominant, and even then there would be no way to ensure that every single previously sold USB device had been destroyed.

Advertisement

Even commonly available password-protected pen drives can be compromised - the duo demonstrated a technique by which any password set by a user could be invalidated. The user might continue thinking his device is secure, but unbeknownst to him, any combination of characters will be able to unlock it.

Another demonstration involved modifying a commodity pen drive so that it contains a completely hidden partition which is only mounted by plugging a pen drive into a PC and then ejecting it. When unmounted, the secret partition's contents are not detectable even to forensic examination tools. The final demo was of a virtual keyboard which was capable of taking over input and entering commands on a PC - just plugging in any USB device could trigger a flood of keyboard inputs that could potentially be used to install malware, steal passwords, or anything else.

Advertisement

In effect, USB itself should now be considered fundamentally insecure. Users concerned about device and data security should not use any new USB device that comes into their possession. Affected devices cannot be detected and there is no patch. At most, according to the two demos, PCs might be able to detect fishy behaviour but would not be able to prevent it before it happened. The USB-IF has not responded, although at least one secure device vendor, Ironkey, has publicly announced that its products are not vulnerable because they use signed firmware code, and signatures are verified on each use to make sure the code has not been tampered with.

USB as a standard is already set to become a lot more confusing with the impending debut of the new, backwards-incompatible Type-C connector which will work with existing USB 3.0 and older devices as well as upcoming USB 3.1 standard.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Scientists Find Billion-Year-Old Water Traces Inside Asteroid Ryugu
  1. Ryugu Samples Reveal Ancient Water Flow on Asteroid for a Billion Years
  2. Scientists Create Most Detailed Radio Map of Early Universe Using MWA
  3. Mayor of Kingstown Season 4 OTT Release: Know When, Where to Watch Jeremy Renner's Crime Drama
  4. Our Fault Is Streaming Now: Know All About This Gabriel Guevara and Nicole Wallace Starrer
  5. The Conjuring: Last Rites Is Now Streaming Online: Know Where to Watch the Latest Installment from the Horror Franchise
  6. Delhi Crime Season 3 OTT Release: Know When to Watch This Shefali Shah Thriller Series
  7. Vast Space to Launch Haven-1, the World’s First Private Space Station in 2026
  8. Atmospheric Carbon Dioxide Soars to 424PPM, Marking Biggest Yearly Jump Ever
  9. Black Hole Tears Star Apart, Sends Out Powerful Flares Six Months Later
  10. Shakthi Thirumagan OTT Release: When, Where to Watch Vijay Antony-Starrer Action Thriller Online?
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.