Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

This Little USB Necklace Hacks Your Computer In No Time Flat
TechCrunch via Hacker News ^ | Dec 18, 2014 | Sami Kamkar

Posted on 05/14/2015 5:42:34 PM PDT by 9thLife

Quick! The bad guy/super villain has left the room! Plug in a mysterious device that’ll hack up their computer while an on-screen progress bar ticks forward to convey to the audience that things are working!

It’s a classic scene from basically every spy movie in history. In this case, however, that mystery device is real.

Samy Kamkar — developer of projects like that massive worm that conquered MySpace back in 2006, or SkyJack, the drone that hijacks other drones — has released a video demonstrating the abilities of a particularly ridiculous “necklace” he sometimes wears around.

Called USBdriveby, it’s a USB-powered microcontroller-on-a-chain, rigged to exploit the inherently awful security flaws lurking in your computer’s USB ports. In about 60 seconds, it can pull off a laundry list of nasty tricks:

It starts by pretending to be a keyboard/mouse. If you have a network monitor app like Little Snitch running, it uses a series of keystrokes to tell LittleSnitch that everything is okay and to silence all warnings. It disables OS X’s built-in firewall. It pops into your DNS settings and tweaks them to something under the hacker’s control, allowing them to replace pretty much any website you try to visit with one of their own creation. It opens up a backdoor, then establishes an outbound connection to a remote server which can send remote commands. Since the connection is outbound, it eliminates the need to tinker with the user’s router port forwarding settings. It closes any windows and settings screens it opened up, sweeping up its footprints as it heads for the door. So in 30-60 seconds, this device hijacks your machine, disables many layers of security, cleans up the mess it makes, and opens a connection for remote manipulation even after the device has been removed. That’s… kind of terrifying.

While the video above focuses on OS X, the methods tapped here aren’t exclusive to Apple’s platform. Kamkar says everything shown so far is “easily extendable to Windows or *nix.”

So what can you do to protect yourself from things like this? Not a whole lot, really — that’s why attacks like this and BadUSB are so freaky. A lot of these flaws are inherent to the way the USB protocol was designed and implemented across so many hundreds of millions of computers; short of filling your USB ports with cement or never,


TOPICS: Computers/Internet; Education
KEYWORDS: hack; usb
Navigation: use the links below to view more comments.
first 1-2021-29 next last

1 posted on 05/14/2015 5:42:34 PM PDT by 9thLife
[ Post Reply | Private Reply | View Replies]

To: 9thLife

And where can I get one of these?


2 posted on 05/14/2015 5:45:40 PM PDT by dware (In 2016, the GOP has 2 choices: CRUZ OR LOSE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dware

NSA surplus store.


3 posted on 05/14/2015 5:48:10 PM PDT by Raycpa
[ Post Reply | Private Reply | To 2 | View Replies]

To: 9thLife

My USB ports are protected by one of these.

4 posted on 05/14/2015 5:48:47 PM PDT by chris37 (Heartless)
[ Post Reply | Private Reply | To 1 | View Replies]

usb port blocker

http://www.amazon.com/Lindy-USB-Port-Blocker-40452/dp/B000I2JWJA/ref=sr_1_1?ie=UTF8&qid=1431651149&sr=8-1&keywords=usb+lock


5 posted on 05/14/2015 5:51:46 PM PDT by Kipp
[ Post Reply | Private Reply | To 4 | View Replies]

To: dware

I think he sho.ws you how to build it.


6 posted on 05/14/2015 5:55:28 PM PDT by 9thLife ("Life is a military endeavor..." -- Francis)
[ Post Reply | Private Reply | To 2 | View Replies]

To: 9thLife

wow, that is scary. so simple, yet so effective


7 posted on 05/14/2015 6:35:09 PM PDT by Scutter
[ Post Reply | Private Reply | To 1 | View Replies]

To: 9thLife
Maybe I'm just paranoid, but I assumed every chinese made USB thumbdrive already did stuff like this.....

So when the day comes that they want to shut down all computers......They just send the command. ;-)

8 posted on 05/14/2015 6:41:35 PM PDT by HP8753 (Live Free!!!! .............or don't.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HP8753

The line between paranoia and sound reasoning is getting mighty thin lately.


9 posted on 05/14/2015 6:44:17 PM PDT by 9thLife ("Life is a military endeavor..." -- Francis)
[ Post Reply | Private Reply | To 8 | View Replies]

To: 9thLife; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; ...
This is a graphic video demonstration of what can be accomplished with the USB vulnerability that ALL computers have. . . it is, however, being demonstrated on a Macbook Pro. With a $20 USB custom dongle device, which has been pre-programed, it is possible to install malware on the Mac that seizes control of your firewall, DNS redirects, and essentially owns your Mac. It DOES however, require physical access to your computer and time (about 1 minute) to do its nefarious activity. It essentially gets around many of the built-in protections Apple has put in to require a human operator by skillful handling of the mouse by positional movement of windows and mouse repositioning by script to do what normally must be done by a human hand.

Do not leave your computer unattended without a password! — PING!


Apple and ALL Computer USB Security Ping!

If you want on or off the Mac Ping List, Freepmail me.

I challenge the members of the Apple ping list to each donate at least $10 each to the latest Freepathon. I HAVE donated $100. Many members of the Apple Ping list are already rising to the challenge. Join them. Let's show the power of the Apple Ping list in supporting Freerepublic!

If you have ordered an Apple Watch,
MAKE A DONATION TO THE FREEPATHON!

10 posted on 05/14/2015 7:14:43 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

We’ve had a thread on this threat before. . . but this one has a great video on how it is done. . . worth watching.


11 posted on 05/14/2015 7:16:06 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 10 | View Replies]

To: chris37

But yours has ammo in the magazine right.....:o)


12 posted on 05/14/2015 7:25:35 PM PDT by Squantos ( Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Squantos

It do, it do, but the magazine isn’t in the well, and the cap is on the magazine.

But my German Shepherd will fend off any suspect USB devices long enough for me to get my weapon system online!


13 posted on 05/14/2015 7:32:08 PM PDT by chris37 (Heartless)
[ Post Reply | Private Reply | To 12 | View Replies]

To: 9thLife; Swordmaker
Creepy. But this USB device must be physically inserted into a machine to compromise it, right?

If so, pay attention to who is allowed access to your machine!

Jesus Christ: You can’t impeach Him and He ain’t gonna resign.




14 posted on 05/14/2015 8:01:25 PM PDT by rdb3 (THY KINGDOM COME!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 9thLife
Good video.

How might a computer determine that a USBdriveby is not just a new keyboard or mouse? Some sort of hardware authentication?

15 posted on 05/14/2015 8:12:34 PM PDT by TChad (The Obamacare motto: Dulce et decorum est pro patria mori.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3
Creepy. But this USB device must be physically inserted into a machine to compromise it, right?

Posilutely, absotively correctomundo. . . and it will work just as well on a Windows or Linux box with a USB port because the vulnerability is in the USB standard. It's why Apple went with the new USB-C ports. Those don't have that vulnerability.

16 posted on 05/14/2015 8:19:21 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 14 | View Replies]

To: TChad
How might a computer determine that a USBdriveby is not just a new keyboard or mouse? Some sort of hardware authentication?

from my understanding, it cannot. They'd have to change the USB standard completely. . . or put USB into a sandbox on the system. That is probably the only viable solution.

17 posted on 05/14/2015 8:21:30 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 15 | View Replies]

To: TChad

Each USB device has a unique hardware ID. It is a sequence of two 32-bit hex numbers: something like 0FEF:A7E8.

(Tip: it looks like a 32-bit segmented memory address! Run for the hills!)

The first word is the manufacturer ID. They are unique, up to 2^32 manufacturers can be listed (~4.2 billion).

The second word is a unique number assigned to the specific device. As such, each manufacturer can have up to 2^32 different devices.

Note that this is listed BEFORE the device even tells the computer what USB device class it is (HID, in this case—human interface devices, which encompass keyboards and mice)—one could theoretically block devices coming from a particular manufacturer.

(Tip: The manufacturer ID used in the example actually refers to a real business concern; they don’t really have any devices to speak of...)


18 posted on 05/14/2015 10:28:00 PM PDT by __rvx86 (Ted Cruz: Proving that conservative populism is a winning strategy. GO CRUZ!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: __rvx86
Whoops; that was supposed to say "two 16-bit hex numbers."

Which means that there are up to 65536 manufacturers, with 65536 devices each.

19 posted on 05/14/2015 10:31:22 PM PDT by __rvx86 (Ted Cruz: Proving that conservative populism is a winning strategy. GO CRUZ!)
[ Post Reply | Private Reply | To 18 | View Replies]

To: rdb3
Jesus Christ: You can’t impeach Him and He ain’t gonna resign.

I could see his POTUSness usurping this motto.

20 posted on 05/15/2015 12:29:17 AM PDT by 9thLife ("Life is a military endeavor..." -- Francis)
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson