thewayne: (Cyranose)
[personal profile] thewayne
Yes, USB devices can carry malware, we all know that. This is new and different. Basically, it is not difficult to hack the hardware that controls the USB device, be it memory stick, external hard drive, or possibly smart phone or tablet. Malware injected in to the controller is pretty much undetectable, and if it can't be detected, it can't be removed.

I haven't seen reports of this problem being found in the wild, but if security researchers have found it and exploited it, there's no reason to think that bad actors such as criminals or government agencies haven't done it.

Solution? There isn't one at this time, it's too low-level of a problem like malware in hypervisors, all but impossible to detect. The best posited solution would be to apply checksums against all USB firmware, which would entail replacing all USB devices. At least you'd know if a device had been altered and was therefore untrustworthy, the question at that point would be whether the device could be remediated or should be destroyed.

http://www.wired.com/2014/07/usb-security/

https://www.schneier.com/blog/archives/2014/07/the_fundamental.html

Date: 2014-08-01 08:49 pm (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
So a truly secure computer has no network access, no peripherals, no input other than by a device that cannot be keylogged, its operating system on ROM, and all the secure data similarly on some form of read-only chip?

Which makes it basically useless, I'm guessing.

Date: 2014-08-01 08:55 pm (UTC)
From: [identity profile] thewayne.livejournal.com
That's about the size of it.

Date: 2014-08-01 09:03 pm (UTC)
From: [identity profile] thewayne.livejournal.com
I think what it gets down to is that if someone really Really REALLY wants to get at the data in your systems, there are vectors that can be exploited that you simply cannot defend against.

Defend what you can, and aside from that, about all you can do is Don't Worry, Be Happy.

Date: 2014-08-01 10:19 pm (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
True. Presumably, at some point, it becomes more cost-effective to go after someone else.

That said, something like this chain of thought should be a pretty strong reason to be as transparent as possible in your dealings with everyone. If you don't look like you have lots of secrets, and nothing of value, then nobody wants you.

June 2025

S M T W T F S
123456 7
8910 11121314
15161718192021
22232425262728
2930     

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 12th, 2025 05:03 am
Powered by Dreamwidth Studios