In a gambit aimed at driving manufacturers to beef up protections for USB flash drive firmware, two security researchers have released a collection of tools that can be used to turn those drives into silent malware installers.
The code release by researchers Adam Caudill and Brandon Wilson comes two months after researchers from Berlin-based Security Research Labs (SRLabs) demonstrated an attack dubbed BadUSB at the Black Hat security conference in Las Vegas.
The BadUSB attack showed how a USB thumb drive connected to a computer can automatically switch its profile to a keyboard—and send keystrokes to download and install malware—or emulate the profile of a network controller to hijack DNS settings.
To read this article in full or to leave a comment, please click here Reported by PC World 18 hours ago.
The code release by researchers Adam Caudill and Brandon Wilson comes two months after researchers from Berlin-based Security Research Labs (SRLabs) demonstrated an attack dubbed BadUSB at the Black Hat security conference in Las Vegas.
The BadUSB attack showed how a USB thumb drive connected to a computer can automatically switch its profile to a keyboard—and send keystrokes to download and install malware—or emulate the profile of a network controller to hijack DNS settings.
To read this article in full or to leave a comment, please click here Reported by PC World 18 hours ago.