BadUSB attack code has been made public

Posted on Wednesday, October 08 2014 @ 15:01 CEST by Thomas De Maesschalck
BBC News writes that security researchers have release attack code that exploits BadUSB, a vulnerability in the USB protocol that allows attackers to hide malware in the firmware of any USB-based device. So far there has been no solution for BadUSB because the problem is structural and no single vendor is in a position to change that. The researchers write cybercrime groups definitely have the resources to figure out how to exploit the vulnerability on their own so they decided to make the exploit code public to remind USB vendors of its seriousness.
Among other things the firmware tells a computer what kind of a device is being plugged into a USB socket but the two cybersecurity researchers found a way to subvert this and install attack code. At Black Hat, the BBC saw demonstrations using a smartphone and a USB stick that could steal data when plugged into target machines.

Mr Nohl said he and his colleague did not release code in order to give firms making USB-controlling firmware time to work out how to combat the problem.

Now researchers Adam Caudill and Brandon Wilson have done their own work on the USB flaw and produced code that can be used to exploit it. The pair unveiled their work at the DerbyCon hacker conference last week and have made their attack software freely available via code-sharing site Github.


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments