📜 ⬆️ ⬇️

Android-smartphone turned into a fake USB-keyboard

At the hacker Black Hat DC conference, security specialists from the American University of George Mason showed a relatively new way to hack a PC, in which a reprogrammed Android smartphone, when connected via USB, impersonates another USB HID device, for example, a keyboard. In this case, various commands can be launched from the smartphone, including the installation of malware. In a similar way via USB, you can attack one smartphone from another, through a specially modified USB cable.

Windows and Macintosh systems (which automatically activate any device connected via USB with minimal indication) and Linux (where no new device is reported at all) are susceptible to hacking. In the case of a Mac, a cracker can quickly remove a pop-up message from the screen using a freshly connected device, and under Windows the pop-up message disappears after 1-2 seconds.

The practical method of this method of attack, however, is minimal, because it requires physical access to the victim's computer, and if there is such access, then a similar effect can usually be achieved simply by typing text on a regular keyboard.

On the other hand, you can write a virus that will spread via USB to each new smartphone and PC.
')
It is very difficult for antivirus to deal with this type of attack, because it is impossible to filter USB traffic and distinguish a real keyboard from a “fake” one, or to understand what “keyboard” behavior is malicious.

Such methods of hacking have been used before. For example, in April 2010, specialists from the Royal Military College of Canada demonstrated a modified USB keyboard with a built-in microchip that performs the function of a trojan.

Source: https://habr.com/ru/post/112244/


All Articles