Another day, another apocalyptic prognostication of computer security doom, this time focusing on the omnipresent USB connection. It's called 'BadUSB', and it's a malware proof-of-concept created by security researchers Karsten Nohl and Jakob Lell that exploits a flaw in and resides in the firmware that controls the basic function of USB devices. The researchers claim that it's not a problem that can be patched, saying that they're "exploiting the very way that USB is designed," but in the end all they've done is highlight that you shouldn't go around plugging USB drives, devices, or whatnot that you don't trust into your computer.
There are a lot easier ways to hack most any computer, especially when this method requires achieving physical access. As we've said many times before, once you've lost physical control of your device, all bets are off. This is just one more way, although it's exploiting something that we take for granted these days.
Because the BadUSB code lives in the USB firmware of the device, it's not something that can be easily purged from a device. Wiping or reformatting a USB drive doesn't touch the USB firmware, so the malware would still be present. BadUSB could allow any connected computer to be exploited over that connection, with Nohl and Lell offering more traditional exploits from there such as replacing files on the computer with additional malware, acting as a virtual keyboard to execute commands on the computer, or hijacking and spying on internet traffic.
BadUSB is also self-propagating: it can copy itself onto a computer and reprogram the USB firmware of other attached USB devices. It can even reside in non-storage devices, such as smartphones and mice.
While we doubt that this is in fact an impossible-to-patch exploit — certainly, patching the USB firmware on computers to prevent such access seems like a possibility, and very few would likely go through the effort of patching their flash drives — in the meantime it poses a theoretical challenge for users.
But it all boils down to this: Don't plug anything you don't trust into your computer, your smartphone, or your tablet. That's pretty much common sense, though, so just think before you plug your phone into a random computer to charge, or you accept a USB drive from a stranger. Be smart about what you plug into your computer, and (far more importantly) keep your eyes open for the online threats that are coming at you every day in the real world.
We may earn a commission for purchases using our links. Learn more.
Gmail Dark Mode rollout finally complete on iPhone and iPad
Google has officially released Dark Mode support for Gmail on both the iPhone and iPad on iOS 13.
This is how to check if a used iPhone or iPad was stolen from Apple
With several Apple stores looted and their display devices stolen, make sure you know how to spot if a device was stolen from Apple.
No, this mockup isn’t the iPhone 13
There's a 3D-printed mockup doing the rounds and people claim it's the iPhone 13. But there are a few problems with that. Starting with the fact it isn't.
Quickly charge up with one of these USB-C-to-Lightning cables
Looking for a USB-C-to-Lightning cable to charge your iPhone from your MacBook, iPad Pro, or USB-C power adapter? Here ere are some of the best USB-C-to-Lightning cables around.