Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
so, if the firmware is a problem, patch it.
It is surprising how many people don't understand this article. The firm were being talked about is on the USB device. Normally that firmware is never touched after leaving the factory.

The fact that you would have to rewrite the firmware for a USB device puts this hack outside of the normal script kiddie activities. You would need to have the development tools at your disposal to write the code and possible hardware tools to load it into the devices firmware.
Either that, or everyone stop using usb. Switch to TB.
The same sort of exploit could be generated for TB, PCI Express cards and a number of tether ports.
Either this would have to be physical product purchased *fake* to good genuine, or on existing physical access..
You would normally assume that the firm ware is good from the factory. At some point modified firm ware would have to be loaded into the device. If the devices firm ware is capable of being updated over USB then that might be rather easy to do. If the device requires more direct programming that could be far more difficult.
Very few stuff these days rarely used remote access, just you must have control to begin with and or allow access by the OS.

if all that can by by-passed, then beneath the OS ...then, maybe.

I have no idea what you are trying to say above. Once the virus is loaded into your computer it can do whatever it wants. The whole point of such an attack would be to bypass the user.

----------

Please let this help Thunderbolt adoption.

I'm not sure why you beleuve TB would be more secure. If anything it would be less secure.
 
unfortunately, but without knowing anything too much in detail, this "virus" will not present itself as a file but rather more gets injected into the core of the system (the i/o layer) and will explicitely be executed "by design". Even worse, it is by design executed in kernel mode. As firmware is basically a driver, the computer must load and execute it before it can even access the device on any useful level other than probing.

So, any computer running a specific type of cpu (addressed by the firmware) can be vulnerable, no matter what operating system.

fud
 
Yea it sounds like in order to do this, you would have to be either a device manufacturer, or somehow able to insert code into the device manufacturer's code copy that they write to each device.
There is a wide range of possibilities here. For some devices everything including firmware can be reprogrammed over USB.
If the firmware isn't rewritable, I don't see how even some hacker would be able to take a store bought USB device and put it on there, it wouldn't be able to be written to.
True but you would need to know if that is possible or not for every device you own.
Maybe if you just bought raw parts and had the right equipment to flash your own ROM onto chips. Seems difficult though.

Exactly! For most USB hardware this would be a major undertaking. Someone with the resources to do this would find a way to break into your computer anyways. It is virtually impossible to be 100% certain that a comouter is secure.
 
The military has actually banned USB devices for years now. I believe the ban started 4-5 years ago. There was some incident involving Chinese hackers, if I recall correctly.

Probably not a big risk for your average person. Just don't use random people's thumb drives.
 
Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.

This has to be one of the best comments ever. You win, close the forum guys!
 
The common method is to disable the USB drivers. Does that not work? You would need to provide some method to connect a keyboard and mouse.
 
Well, does that mean if USB was replaced with Thunderbolt completely, there wouldn't be vulnerabilities, or is it just a matter of time? Does this effect all Operating Systems? Couldn't you just disable your USB device hardware?
I guess maybe I should just watch the presentation :p

For most MacBooks, the internal keyboard, trackpad, bluetooth module, FaceTime camera and IR receiver are all connected via internal USB headers. Look it up in System Information. If they're compromised somehow, Thunderbolt and Firewire won't save you.

Apple's Keyboard firmware has been compromised in the past. A similar firmware hack compromised an older version of the MacBook battery. You probably remember the firmware hack that enabled iSight cameras without lighting up the green LED indicator.

While these are all for older hardware, it took years to discover the vulnerabilities. Hopefully current hardware has been patched up properly, but we won't likely know for a few more years.
 
Maybe Apple knew this because ios7 introduced a trust confirmation on my usb iPhone.
 
I don't get it: does the "virus" reside on the USB device (such as a flash drive, external HDD or charger) or does it get copied into the computer's USB firmware? So if someone plugs an infected USB device into a computer, does removing the device remove the virus?

I would think that the virus gets transferred when you transfer the file from the USB device to the computer, unless they can write an app that automatically infects the computer simply by plugging in the USB device, but I would assume it's probably the first method rather than the 2nd. I guess it would depend on how the virus is written.

----------

Good thing my G5 Mac has FireWire.

But a G5 won't run the more recent versions of OS X.
 
This is not 1980 anymore when people used to worry about viruses on floppy disks. If a person has physical access to your computer, it is a failing with the security in your building or home, not the technology.

It's not quite that simple. For anyone working in any kind of shared workplace (office, lab, workshop etc.) then they can't control access to their device. You can't assume every co-worker, all cleaning staff, all visiting customers/clients are well-intentioned.

I'd love to know more about the specifics, but if someone can just walk by my ("locked") machine while I'm not nearby, pop in a USB device for a few seconds and that results in a crash or code execution, that's not good.

Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.

Hah! But what if someone uses my slots when I'm not there? Wait... what?
 
Since we have almost everything made in China and they're a known vector for malware it stands to reason the fix is to not buy anything from shadey Chinese companies and to be very cautious of anything made in China (including iPhones, iPods, etc.) until this can be added to the antimalware checks security suites do.
 
I remember news from some months ago that said that iOS devices could be attacked by rogue chargers or something like that.
 
Don't trust technology too much.

People, I really think it's time we stop trusting and relying too much on technology and start being more viligant/aware. There is no way technology will be 100% secure and it will never be in the future. It's sad, but that's the truth :(. Find better alternatives people, it's out there.
 
Unfortunately, but without knowing anything too much in detail, this "virus" will not present itself as a file but rather more gets injected into the core of the system (the I/O layer) and will explicitely be executed "by design". Even worse, it is by design executed in kernel mode. As firmware is basically a driver, the computer MUST load and execute it before it can even access the device on any useful level other than probing.

So, any computer running a specific type of CPU (addressed by the firmware) can be vulnerable, no matter what operating system.

That doesn't sound correct at all. The USB device has its own firmware that lets it do its stuff. Your computer has a driver for the USB device. The USB can't magically infect your driver, no matter what the USB firmware does.

What the USB can do - with compromised firmware - is provide false files. You could, for example, have an installation file on a USB stick and when you actually come to download it to your computer, it gets replaced by a malicious file instead.
 
This is not 1980 anymore when people used to worry about viruses on floppy disks. If a person has physical access to your computer, it is a failing with the security in your building or home, not the technology.

Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.

And what you obviously don't understand is that this can happen to any USB device. So I could hand you a mouse to use, you hook it to you computer at home, and I win. This is currently undetectable, and at the moment untreatable. So, if you use any USB device anywhere (use a thumb drive at school and home, at work and home, etc...) you are vulnerable.

Should this happen? No. Does it happen? Yup. I wonder if the USB connection made from iOS devices is vulnerable. I wonder if USB plugs (AC to DC) are vulnerable too...
 
Nothing new. The Hak5 Rubber Ducky has had keystroke injection capability for years. It essentially pretends to be a keyboard and the computer implicitly trusts it. Only $39.99 too.
 
Firmware Hacks are not new

http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed/

Remember this folks? Yep was demonstrated on us Macy people.

Its a sneaky very low profile way of getting malicious code onto a person's computer. However it has to have a way to execute. If the code doesn't run than it isn't actually a threat.

Although getting the payload onto the device may not be as hard as you think if it pretends to be a HID and auto-types in code into command prompts like DOS-Shell or Terminal.
https://www.youtube.com/watch?feature=player_detailpage&v=JwLRjNPrO2c#t=262

They could also attack along other know vectors, such as Windows Autoplay.
 
In other words, the NSA has been using this vulnerability for years. Probably is silently sleeping in everyone's computer.
 
Thunderbolt, FireWire, and ExpressCard (and variants) are all vulnerable to DMA attacks.
Just because there has been an exploit discovered for USB does not make them any more secure.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.