• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Malicious USB installers will change security landscape for flash drives

By Guest Authors

In an effort to convince the makers of universal serial bus drives to improve the security of their firmware, a team of security researchers demonstrated how easy it is to turn the thumb drives in USBs into a malicious installer.

On top of that, researchers Adam Caudill and Brandon Wilson have published the actual tools they used to convert those drives into malware. The work of turning the drives into malicious installers could be done through a keyboard attack, which the researchers demonstrated with exact likeness during a Derbycon exhibit.

usb-security

The USB thumb drives with which the tools employed by the researchers are found to be using the Phison 2251-03 controller, which has been further discovered to also apply to other controllers that the Phison Electronics company in Taiwan developed. At present, there are quite a number of USB thumb drives containing the Phison controllers that are easily accessible in the market.

In releasing the tools for turning the thumb drives into malicious installers, the security researchers are hoping to spur USB manufacturers to move and bolster the protection of their flash drive firmware with new updates and also urges Phison to add support for signed updates on USB controllers that the company sells.

But of course it is not only Phison Electronics that offers USB controllers on a large scale, there are other manufacturers too, but it is the hands of Phison that Caudill and Wilson expect to see the initiative first for securing the devices.

To some degree, the attack can be mitigated. But the security researchers acknowledged the fact that the device’s thumb drive itself is hard to combat since the miniature computer is in full control over the events taking place within the USB, therefore the certainty that it might be made to hide malicious activities.

At the very least, USB manufacturers could require the installation of signed firmware updates on the devices’ controllers in order to avoid alterations to the firmware once purchased by users. Although this has been in practice among many USB vendors, quite a considerable number of sellers still do not observe this security measure.

Caudill and Wilson released the code after they first learned of the idea during a demonstration by other security researchers during a Black Hat security conference in Las Vegas, where the so-called BadUSB attack was demonstrated. Based on the demonstration, a BadUSB attack enables a computer-connected USB thumb drive to switch its profile and transmit keystroke data to install a malware or maneuver the DNS settings.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Kodak Luma 500 Review – An Impressive Mini Projector with Native 1080p Resolution

Hohem iSteady V3 Ultra AI Gimbal Review – Smartphone Videography with Advanced AI and Control

iKoffy EdiBot Food Printer Review – Can It Replace Latte Art?

DYMESTY AI Glasses Review – Could These Be Your Next Wearable?

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • iPhone 17 Pro Max Model Number A3257, A3525, A3526, A3527 Differences
  • iPhone 17 Pro Model Number A3256, A3522, A3523, A3524 Differences
  • Why Tesla Displays Go Black – And How It Was Fixed?
  • Kodak Luma 500 Review – An Impressive Mini Projector with Native 1080p Resolution

Copyright © 2025 · All Rights Reserved