{"id":12539,"date":"2016-07-08T10:44:17","date_gmt":"2016-07-08T14:44:17","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=12539"},"modified":"2020-02-26T11:10:01","modified_gmt":"2020-02-26T16:10:01","slug":"badusb-solved","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/badusb-solved\/12539\/","title":{"rendered":"Our cure for BadUSB"},"content":{"rendered":"<p>A virus that discreetly infests hardware may be the user\u2019s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don\u2019t examine systems at the hardware level. Such attacks pose a very real threat because every day we use hardware that has <a href=\"https:\/\/www.kaspersky.com\/blog\/hardware-malware\/8169\/\" target=\"_blank\" rel=\"noopener nofollow\">exploitable<\/a> vulnerabilities. For example, a couple of years ago researchers found an inherent flaw in the USB interface. They called it BadUSB.<\/p>\n<p>By tampering just slightly with the USB device\u2019s firmware code, an outside party can modify it and inject malware that makes the compromised device pretend it is something else.<\/p>\n<p>After such a modification, an ordinary thumb drive might, for example, impersonate a USB keyboard and input certain commands \u2014 say, to erase all of your files. Or it could pretend it\u2019s a network adapter and listen to the data flow between a computer and the Internet.<\/p>\n<p>The problem is that such malware is stored in the thumb drive\u2019s controller, invisible from the outside. An ordinary antivirus product cannot dig that deep: It does not see any viruses on the flash drive because the malware is on a much lower layer than a standard antivirus sweep checks. The second issue is that there is no cure for the inherent USB flaw.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">5 threats that could affect hardware \u2013 <a href=\"http:\/\/t.co\/CP1DSfkgy3\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/CP1DSfkgy3<\/a> <a href=\"http:\/\/t.co\/cnse35hAr3\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/cnse35hAr3<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/592735335156682752?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 27, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>However, a group of Kaspersky Lab experts \u2014 Oleg Zaitsev, Olga Domke, Konstantin Manurin, and Mikhail Levinsky \u2014 found a way to deal with the problem. Their technology automatically tracks USB devices\u2019 behavior, and it blocks devices that behave suspiciously.<\/p>\n<p>This technology is already integrated into our enterprise product, <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-select\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security<\/a>; and just a few days ago the team <a href=\"http:\/\/pdfpiw.uspto.gov\/.piw?docid=09386024\" target=\"_blank\" rel=\"noopener nofollow\">was granted a US patent on it<\/a>.<\/p>\n<p>Olga Domke explains: \u201cAlthough attacks using modified or corrupted USB devices are considered theoretical, BadUSB\u2019s presence excites clients\u2019 interest in protection solutions. Nobody wants to be unprotected when theory translates into practice.\u201d And so the product and component teams worked together to develop \u201cBadUSB attack\u201d for Kaspersky Endpoint Security for Windows, a heuristic component that balances endpoint usability and administrator peace of mind.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Any USB device can potentially be zombified and turned into a secret agent for cybercrooks. The world needed a shield against this threat, so we rolled up our sleeves and created one.<\/p>\n","protected":false},"author":522,"featured_media":12574,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,7,2683],"tags":[1038,999,1226,352,1699,97,422,424],"class_list":{"0":"post-12539","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-products","9":"category-threats","10":"tag-badusb","11":"tag-gadgets","12":"tag-hardware","13":"tag-kaspersky-lab","14":"tag-patents","15":"tag-security-2","16":"tag-threats","17":"tag-usb"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/badusb-solved\/12539\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/badusb-solved\/7382\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/badusb-solved\/7350\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/badusb-solved\/8633\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/badusb-solved\/8571\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/badusb-solved\/12425\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/badusb-solved\/2249\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/badusb-solved\/6429\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/badusb-solved\/5090\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/badusb-solved\/8147\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/badusb-solved\/11955\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/badusb-solved\/12425\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/badusb-solved\/12539\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/badusb-solved\/12539\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/badusb\/","name":"BadUSB"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12539"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12539\/revisions"}],"predecessor-version":[{"id":33713,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12539\/revisions\/33713"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12574"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}