Wikileaks: CIA Stuxnet-Like Attacks Hacked Unconnected PCs Via USB

Discussion in 'other security issues & news' started by Minimalist, Jun 22, 2017.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    https://www.forbes.com/sites/thomas...soft-windows-to-jump-air-gap-with-thumb-drive
     
  2. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    24,099
    Location:
    UK
    Some info on this here also
    https://www.bleepingcomputer.com/ne...ing-air-gapped-networks-via-usb-thumb-drives/

     
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    A couple of weeks ago I saw the "Zero Days" movie about Stuxnet. Quite a clever way to get malware running on machines I must say. I didn't realize that connecting an external drive could automatically infect a system.
     
  5. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    The truth about usb sticks and sd cards is much worse than just the ability to transport malformed windows .lnk files.
    The memory in them is unreliable and requires complex error correction algorithms to keep them working. For this reason every one of them has a tiny microcontroller, I believe it is an ARM CPU or something similar. Even those tiny micro sd cards has one.These can be reprogrammed to do pretty much anything from a malware point of view and that this was done is undetectable in any practical way.
     
  6. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
  7. gorblimey

    gorblimey Registered Member

    Joined:
    Jan 19, 2017
    Posts:
    158
    Location:
    West Oz
    It's worth noting that the recent WannaCry infection of Victorian (Oz) traffic camera controllers was by... wait for it... a thumbdrive. :eek::gack:

    Best-Practice security mandates removal or non-installation of anything not an internal drive. If you can stick something in, you will be infected. The usual vector is... wait for it... autorun.inf. :eek::gack: Bare boxes with only a CAT-x plug at the back are easily available: no holes of any description including speaker cables and CD/DVD. Monitors and keyboards ditto.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    With an AE/white-listing tool you should be able to block these kind of attacks.
     
  9. gorblimey

    gorblimey Registered Member

    Joined:
    Jan 19, 2017
    Posts:
    158
    Location:
    West Oz
    The problem is not me on my box, it's employees on the company boxes.

    OTOH, yes a decent AE should be set to treat all removeable media as hostile and block without asking--that is, all minions' boxes have (insert VS here!) set to Autopilot and the shield and tray icon hidden. And yes anything that looks like a server really should have an AE installed. We hope the management does not use the server as their personal workstation :eek:

    However, my personal preference would be the company boxes have only the holes needed to connect to the company intranet, which includes the printer and scanner. That is, one RJ45 hole for one CAT-x cable. Employees do not need to conduct personal affairs on the company boxes.

    It's the difference between an effective software solution which can be reset by knowledgeable users on the one hand, and simple hardware which imposes a much higher difficulty level to be hacked.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.