Another day, another apocalyptic prognostication of computer security doom, this time focusing on the omnipresent USB connection. It's called 'BadUSB', and it's a malware proof-of-concept created by security researchers Karsten Nohl and Jakob Lell that exploits a flaw in and resides in the firmware that controls the basic function of USB devices. The researchers claim that it's not a problem that can be patched, saying that they're "exploiting the very way that USB is designed," but in the end all they've done is highlight that you shouldn't go around plugging USB drives, devices, or whatnot that you don't trust into your computer.
There are a lot easier ways to hack most any computer, especially when this method requires achieving physical access. As we've said many times before, once you've lost physical control of your device, all bets are off. This is just one more way, although it's exploiting something that we take for granted these days.
Because the BadUSB code lives in the USB firmware of the device, it's not something that can be easily purged from a device. Wiping or reformatting a USB drive doesn't touch the USB firmware, so the malware would still be present. BadUSB could allow any connected computer to be exploited over that connection, with Nohl and Lell offering more traditional exploits from there such as replacing files on the computer with additional malware, acting as a virtual keyboard to execute commands on the computer, or hijacking and spying on internet traffic.
BadUSB is also self-propagating: it can copy itself onto a computer and reprogram the USB firmware of other attached USB devices. It can even reside in non-storage devices, such as smartphones and mice.
While we doubt that this is in fact an impossible-to-patch exploit — certainly, patching the USB firmware on computers to prevent such access seems like a possibility, and very few would likely go through the effort of patching their flash drives — in the meantime it poses a theoretical challenge for users.
But it all boils down to this: Don't plug anything you don't trust into your computer, your smartphone, or your tablet. That's pretty much common sense, though, so just think before you plug your phone into a random computer to charge, or you accept a USB drive from a stranger. Be smart about what you plug into your computer, and (far more importantly) keep your eyes open for the online threats that are coming at you every day in the real world.
We may earn a commission for purchases using our links. Learn more.
Everything you need to know about the Pixel 4a and Pixel 4a 5G
The Pixel 4a is now available, the Pixel 4a 5G is coming soon, and we've rounded up everything you need to know about both phones. Let's dive in!
What to expect from Amazon's September 2020 Alexa & Ring hardware event
Amazon is set to host its annual fall hardware event on Thursday, September 24. Here are a few devices that we might expect to see at tomorrow's event.
How does Samsung's S Pen work so damn well?
There are other reasons to want a Galaxy Note, but if you want a good stylus experience, it's really the only phone that has one. That's because Samsung has made the S Pen part of the phone through both hardware and software.
Open your eyes to the world of Linux with the best laptops
Linux has been around forever, and you don't need a desktop computer in order to tinker around and use it. These are the best laptops made to run Linux and come in many different forms, and some of the options may surprise you.