Bitcoin Forum
May 10, 2024, 10:42:41 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Why the Security of USB Is Fundamentally Broken  (Read 1195 times)
W2014 (OP)
Member
**
Offline Offline

Activity: 205
Merit: 10



View Profile
July 31, 2014, 08:13:58 PM
 #1

Implications for Armory cold storage methods?

Why the Security of USB Is Fundamentally Broken

Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t just in what they carry, it’s built into the core of how they work.

Full Wired.com article is here:

http://www.wired.com/2014/07/usb-security/

Thoughts?

VIAZ   ►   First Major Decentralized Peer-to-Peer Funding Platform on Tezos   ◄
WEBSITE | BOUNTY CAMPAIGN | WHITEPAPER | FACEBOOK | TWITTER | TELEGRAM
The grue lurks in the darkest places of the earth. Its favorite diet is adventurers, but its insatiable appetite is tempered by its fear of light. No grue has ever been seen by the light of day, and few have survived its fearsome jaws to tell the tale.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715380961
Hero Member
*
Offline Offline

Posts: 1715380961

View Profile Personal Message (Offline)

Ignore
1715380961
Reply with quote  #2

1715380961
Report to moderator
segeln
Hero Member
*****
Offline Offline

Activity: 602
Merit: 500


View Profile
July 31, 2014, 08:55:23 PM
 #2

I think this is the original article in the german monthly "DIE ZEIT"

http://www.zeit.de/digital/datenschutz/2014-07/usb-controller-chip-angriff-srlabs

As I understand it, a  german security Research Group has developed a kind of possible attacks by USB Sticks .
but they are not "on the market"
It is just a result of a scientific security Research.
But I am waiting for Armory devs reply
btchris
Hero Member
*****
Offline Offline

Activity: 672
Merit: 504

a.k.a. gurnec on GitHub


View Profile WWW
July 31, 2014, 09:26:56 PM
 #3

This has actually been done before, but not to the extent that the new researchers have reached.

The basic moral of the story is "don't let someone else plug something into your PC, it might be dirty." (this rule works IRL, too, if you  s/your PC/you/  Wink)

In other words, if you're using a USB stick to bridge the air gap, make sure it's one you bought yourself from a reputable seller, and then you'll probably be OK. I say probably because in theory, if your online PC is compromised, there are some USB sticks whose firmwares could be reprogrammed turning a clean USB stick into a dirty one.

It will be interesting to see if any malware in the future tries to do this automatically....

There was a thread that talked about this not too long ago: Offline wallet - USB key alternatives - security concerns
DrG
Legendary
*
Offline Offline

Activity: 2086
Merit: 1035


View Profile
August 02, 2014, 08:57:09 AM
 #4

You could always use an ancient USB drive with a flash area so small that the "upgraded" firmware could not be put on there.  Kind of like how dumbphones might actually be smarter for security purposes.
SMB-2525
Full Member
***
Offline Offline

Activity: 195
Merit: 100


View Profile
August 03, 2014, 07:05:48 PM
 #5

The main point of the article is it is more than USB sticks - which are expected to potentially contain malware. Any USB device (mouse, network, keyboard) can theoretically be configured with malware. These "nonstick" devices are typically not evaluated for malware and the embedded firmware executes on connection.

That is, however, a very sophisticated attack because the attacker has to get their their malware into the device.

Made in China anyone?
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!