[Blockierte Grafik: http://s1.directupload.net/images/140731/xuilx8bn.jpg] DAS ERMÖGLICHT DIE KOMPLETTE ÜBERNAHME EINES SYSTEMS
USB-Geräte die infizierte Dateien verbreiten sind nicht neu, neu ist
das nun direkt die Firmware eines USB-Gerätes infiziert werden kann.
IN DEM ANTIVIRENSCHUTZ NICHT MEHR MÖGLICH IST !!!
Vorab wurde der Monitor Redaktion & Zeit ONLINE demonstriert wie die Übernahme Das WDR-Magazin MONITOR berichtet in seiner heutigen Ausgabe (ARD, 31. Juli 2014 [Blockierte Grafik: http://s1.directupload.net/images/140731/kzsxdkla.png]
Mitarbeiter der Firma Security Research Labs GmbH wollen auf der diesjährigen
Sicherheitskonferenz BlackHat in LasVegas zeigen wie einfach das gehen kann.
eines Systems durch das Manipulieren der Firmware eines USB Gerätes funktioniert.
um 21.45 Uhr) detailiert über die Funktionsweise des SRLabs Hacks.
BadUSB Artikel auf SRLabs.de
ZitatAlles anzeigenOriginal auf SRLabs.de
Turning USB peripherals into BadUSB
USB devices are connected to – and in many cases even built into – virtually all computers. The interface standard conquered the world over the past two decades thanks to its versatility: Almost any computer peripheral, from storage and input gadgets to healthcare devices, can connect over the ubiquitous technology. And many more device classes connect over USB to charge their batteries.
This versatility is also USB’s Achilles heel: Since different device classes can plug into the same connectors, one type of device can turn into a more capable or malicious type without the user noticing.
Reprogramming USB peripherals. To turn one device type into another, USB controller chips in peripherals need to be reprogrammed. Very widely spread USB controller chips, including those in thumb drives, have no protection from such reprogramming.
BadUSB – Turning devices evil. Once reprogrammed, benign devices can turn malicious in many ways, including:
A device can emulate a keyboard and issue commands on behalf of the logged-in user, for example to exfiltrate files or install malware. Such malware, in turn, can infect the controller chips of other USB devices connected to the computer.
The device can also spoof a network card and change the computer’s DNS setting to redirect traffic.
A modified thumb drive or external hard disk can – when it detects that the computer is starting up – boot a small virus, which infects the computer’s operating system prior to boot.
Defenses?
No effective defenses from USB attacks are known. Malware scanners cannot access the firmware running on USB devices. USB firewalls that block certain device classes do not (yet) exist. And behavioral detection is difficult, since a BadUSB device’s behavior when it changes its persona looks as though a user has simply plugged in a new device.
To make matters worse, cleanup after an incident is hard: Simply reinstalling the operating system – the standard response to otherwise ineradicable malware – does not address BadUSB infections at their root. The USB thumb drive, from which the operating system is reinstalled, may already be infected, as may the hardwired webcam or other USB components inside the computer. A BadUSB device may even have replaced the computer’s BIOS – again by emulating a keyboard and unlocking a hidden file on the USB thumb drive.
Once infected, computers and their USB peripherals can never be trusted again.
Tools. Please check back here for proof-of-concept tools to be released at BlackHat 2014 on August 7.
Questions? – usb [you know what to put here] srlabs.de