USB Devices Like Keyboards Can be Used to Hack Into PCs: Researcher

Advertisement
By Reuters | Updated: 31 July 2014 14:44 IST
USB devices such as mice, keyboards and thumb-drives can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher revealed on Thursday.

Karsten Nohl, chief scientist with Berlin's SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips that control functions of USB devices but which have no built-in shields against tampering with their code.

"You cannot tell where the virus came from. It is almost like a magic trick," said Nohl, whose research firm is known for uncovering major flaws in mobile phone technology.

The finding shows that bugs in software used to run tiny electronics components that are invisible to the average computer user can be extremely dangerous when hackers figure out how to exploit them. Security researchers have increasingly turned their attention to uncovering such flaws.

Advertisement

Nohl said his firm has performed attacks by writing malicious code onto USB control chips used in thumb drives and smartphones. Once the USB device is attached to a computer, the malicious software can log keystrokes, spy on communications and destroy data, he said.

Advertisement

Computers do not detect the infections when tainted devices are inserted into a PC because anti-virus programs are only designed to scan for software written onto memory and do not scan the "firmware" that controls the functioning of those devices, he said.

Nohl and Jakob Lell, a security researcher at SR Labs, will describe their attack method at next week's Black Hat hacking conference in Las Vegas in a presentation titled: "Bad USB - On Accessories that Turn Evil."

Advertisement

Thousands of security professionals gather at the annual conference to hear about the latest hacking techniques, including ones that threaten security of business computers, consumer electronics and critical infrastructure.

Nohl said he would not be surprised if intelligence agencies like the National Security Agency have already figured out how to launch attacks using this technique.

Advertisement

Last year he presented research at Black Hat on breakthrough methods for remotely attacking SIM cards on mobile phones. In December, documents leaked by former NSA contractor Edward Snowden demonstrated that the U.S. spy agency was using a similar technique for surveillance, which it called "Monkey Calendar."

An NSA spokeswoman declined to comment.

SR Labs tested the technique by infecting controller chips made by major manufacturer Taiwan's Phison Electronics Corp, and placing them into USB memory drives and smartphones running Google Inc's Android operating system.

Similar chips are made by Silicon Motion Technology Corp and Alcor Micro Corp . Nohl said his firm did not test devices with chips from those manufacturers.

Phison and Google did not respond to requests for comment. Officials with Silicon Motion and Alcor Micro could not immediately be reached.

Nohl said he believes hackers would have a "high chance" of corrupting other kinds of controller chips besides those made by Phison, because their manufacturers are not required to secure software. He said those chips, once infected, could be used to infect mice, keyboards and other devices that connect via USB.

"The sky is the limit. You can do anything at all," he said.

In his tests, Nohl said he was also able to gain remote access to a computer by having the USB instruct the computer to download a malicious program with instructions that the PC believed were comikeyboard

ng from a keyboard. He said he was also able to change what are known as DNS network settings on a computer, essentially instructing the machine to route Internet traffic through malicious servers.

Once a computer is infected, it could be programmed to infect all USB devices that are subsequently attached to that PC, which would then corrupt machines that they contact.

"Now all of your USB devices are infected. It becomes self-propagating and extremely persistent," Nohl said. "You can never remove it."

Christof Paar, a professor of electrical engineering at Germany's University of Bochum who reviewed the findings, said he believes the new research will prompt others to take a closer look at USB technology, and potentially lead to the discovery of more bugs. He called on manufacturers to move to better protect their chips to thwart any attacks.

"The manufacturer should make it much harder to change the software that runs on a USB stick," Paar said.

© Thomson Reuters 2014

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Oppo Reno 15 Series Launched With Up To 6,500mAh Battery: See Price, Features
  2. OnePlus Ace 6T Launch Timeline Revealed; Will Sport This Snapdragon Chip
  3. Oppo Find X9 Series Price in India Leaked Again Ahead of Debut
  4. Poco F8 Series Will Be Launched Globally on This Date
  5. Here's When Apple's iPhone 18 Pro Models and Foldable Phone Might Launch
  6. Bitcoin Hovers Near $95,000 Following Crypto Market Wipeout
  7. Vivo X300 and Teleconverter Kit India Prices Tipped Ahead of Launch
  1. Oppo Reno 15 Pro Launched With Dimensity 8450 SoC, 6,500mAh Battery Alongside Reno 15: Price, Features
  2. Mastiii 4 OTT Release Date Tipped Online: Know When and Where to Watch it Online?
  3. Vivo S50 Series Launch Timeline Confirmed: Check Expected Features, Specifications
  4. Brad Pitt's F1: The Movie To Stream on Apple TV+ and Amazon Prime Video This December
  5. AI in Space: Why Elon Musk, Google, and Amazon Want to Make It the Next Frontier?
  6. Bison Kaalamaadan OTT Release Date Confirmed: When and Where to Watch This Tamil Sports Action Drama Online?
  7. Samsung Galaxy Z TriFold Testing Commences in the US Ahead of Imminent Launch: Report
  8. Steak ‘n Shake Expands to El Salvador as Bitcoin Strategy Gains Momentum
  9. Samsung Galaxy Buds 4 Pro Leak Hints at Refreshed Design, Head Gestures Feature
  10. Redmi 15C 5G Price in India, Key Specifications Leaked Ahead of Launch: Here’s How Much it Might Cost
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.