USB malware to render devices 'untrustable'
BadUSB project will show how undetectable malware can be injected into firmware of USB controllers
Security researchers plan to show how USB devices can be reprogrammed with untraceable malware at the latest BlackHat Security conference in Las Vegas next week.
The project, dubbed BadUSB', was the brain child of security researchers at SR Labs, Karsten Nohl and Jakob Lell. They developed the malware after reverse engineering firmware used to control the movement of data in USB sticks.
BadUSB malware works by reprogramming a USB device, not just storing the malware within the memory. It can be set up to emulate a keyboard, steal data, spoof network cards and even install viruses prior to booting.
Worryingly, the researchers claim their malware is not restricted to memory sticks. It could be modified to infiltrate any USB-connected device. A popular target could include smartphones, which are regularly connected to PCs for data transfer and charging purposes.
The researchers claim there is no way to detect their malicious BadUSB code because it is buried within the firmware. Security software will not pick up malware as they don't scan the firmware when looking for malicious code.
"To make matters worse, cleanup after an incident is hard: Simply reinstalling the operating system the standard response to otherwise ineradicable malware does not address BadUSB infections at their root," it was noted in an SR Labs blog post.
"Once infected, computers and their USB peripherals can never be trusted again."
Become a digital service provider
How to transform your business from network core to edgeDownload now
Optimal business results with the cloud
Evaluating the best approaches to hybrid cloud adoptionDownload now
Virtualisation that enables choices, not compromises
Harness the virtualisation technology that's right for your hybrid infrastructureDownload now
Email security threat report 2020
Four key trends from spear fishing to credentials theftDownload now