BAD USB: Attack on a SHUT DOWN Computer | Real Experiment

Sumsub
28 May 202311:16

Summary

TLDRThis video script narrates the alarming threat posed by 'BadUSB' devices, which can be disguised as everyday flash drives. The FBI has reported on such devices sent to various companies, containing malware from the notorious Fin7 hacking group. The video demonstrates how these devices, when plugged into a computer, can execute malicious code, acting as a keyboard to input commands. It also discusses the potential for remote control and the use of social engineering to trick victims. The script concludes with advice on prevention, including using whitelist software for USB devices and exercising caution when handling unfamiliar devices.

Takeaways

  • 🚨 The FBI has been receiving reports of malicious packages sent to companies in various sectors, including transportation, insurance, and defense, with two variants mimicking official communications and gifts.
  • 💡 The packages contain flash drives that are part of a hacking campaign by the group FIN7, known for their advanced encryption tools and dark web activities.
  • 🔍 The video demonstrates how such a flash drive can be used to infiltrate a system, showing the changes it makes when connected to a computer.
  • 🛡️ The video introduces 'Suub', a platform for online address verification, and discusses the importance of verifying addresses to prevent such attacks.
  • 🔑 The flash drive in question is a 'BadUSB' device, capable of acting as a keyboard and executing malicious code remotely.
  • 🔬 Upon connection, the BadUSB device opens an execution window and runs code from an attacker's server, indicating a hardware-based attack.
  • 🔒 The video emphasizes the need for caution, suggesting that only pre-approved devices should be connected to computers to prevent unauthorized access.
  • 🕵️‍♂️ Social engineering plays a key role in these attacks, with the flash drive often used as a decoy to trick victims into plugging it into their computers.
  • 💻 The video explains that even locked computers can be vulnerable to 'delayed RCE' attacks, where the BadUSB waits for the computer to be unlocked before executing malicious code.
  • 🔄 The cost of creating such devices is low, making them easily accessible and widespread, which poses a significant threat to cybersecurity.
  • 🛡️ The video concludes with advice on using whitelisting software and exercising common sense to protect against these types of attacks.

Q & A

  • What has the FBI been receiving reports about since August 2021?

    -The FBI has been receiving reports about several packages sent to US companies in transportation, insurance, and defense, which contained fake flash drives mimicking messages from HHS US or Amazon gifts.

  • Which hack group was discovered to be behind the sent flash drives?

    -The hack group FIN7, known for their dark side and black matter encryption tools, was discovered to be behind the flash drives.

  • What is the purpose of the fake flash drives as described in the video?

    -The fake flash drives are designed to execute malicious code on the connected computer, potentially giving the attackers remote access and control over the system.

  • What is the 'bad USB' mentioned in the script, and what can it do?

    -The 'bad USB' is a malicious device that appears as an ordinary flash drive but is capable of causing irreparable damage to data by executing harmful commands on the connected computer.

  • What is the significance of the Arduino Pro Micro board found inside the bad USB?

    -The Arduino Pro Micro board inside the bad USB is used as a microcontroller to execute the programmed malicious actions, such as acting as a keyboard to input commands or keystrokes.

  • How does the bad USB device bypass suspicion when plugged into a computer?

    -The bad USB device bypasses suspicion by mimicking a regular USB plug and using social engineering to make the package seem authentic, such as including convincing letters and fake gift cards.

  • What is the role of the keylogger in the bad USB attack?

    -The keylogger running on the computer records all keystrokes, which can later be used by the attacker to gain sensitive information or perform unauthorized actions.

  • What is the ssub platform, and how does it relate to the video script?

    -The ssub platform is an online address verification platform that helps prevent attacks by verifying the authenticity of addresses in various industries. It is mentioned in the script as a way to enhance security.

  • What is the 'delayed RCE' mentioned in the script, and how does it work?

    -Delayed RCE (Remote Code Execution) is a technique where the bad USB is programmed to send keystrokes at specific intervals, aiming to catch the moment when the computer is turned on and unlocked, allowing the attacker to gain access without immediate detection.

  • What are some of the methods to prevent bad USB attacks as suggested in the video?

    -Some methods to prevent bad USB attacks include using specialized software to allow only pre-approved devices, implementing a whitelist of USB devices based on their unique vendor and product IDs, and exercising caution by not inserting unfamiliar devices into computers.

  • What is the final recommendation for users to protect themselves from bad USB attacks?

    -The final recommendation is to use common sense and caution, only plug in devices from trusted sources, and use safe, clean computers without important data or internet access for testing suspicious devices.

Outlines

00:00

🔒 The Threat of Malicious USBs: A Deep Dive

This paragraph discusses the FBI's reports on malicious packages sent to companies in critical sectors, imitating both government health guidelines and Amazon gift packages, which were found to contain harmful flash drives. The script reveals the inner workings of these 'bad USBs', which are capable of causing significant damage to data. The video is created by the Su sub verification platform and introduces the voice assistant, Elliot, who guides viewers through the online security landscape. The paragraph also details the technical aspects of the malicious USB, including its Arduino Pro micro board and the social engineering tactics used to deceive victims into using the infected devices.

05:00

🛡️ Combating Cyber Threats with Address Verification

The second paragraph introduces Lucas from Su sub, who explains how online address verification can prevent cyber attacks. Su sub offers three main methods of verification: document upload, geolocation, and access to government databases. Companies can choose which method suits their business best to implement and reduce the number of attacks. The paragraph also touches on the technical aspects of the attack, such as the use of ready-made solutions like Hack 5, the low cost and availability of such devices, and the potential for a 'delayed RCE' attack on locked computers, where the malicious device waits for an opportune moment to execute its code.

10:00

🛡️ Advanced Protection Measures Against Bad USB Attacks

The final paragraph focuses on strategies to protect against bad USB attacks, emphasizing the use of specialized software solutions that whitelist pre-approved devices based on their unique vendor and product IDs. This method safeguards against a variety of attacks and undesirable consequences. The paragraph also stresses the importance of common sense and caution, advising against the insertion of unfamiliar devices into computers, and suggests using safe, clean computers with no sensitive data for testing purposes. Su sub is presented as a resource for safely navigating the online world.

Mindmap

Keywords

💡FBI

The FBI, or Federal Bureau of Investigation, is the principal federal investigative agency in the United States. In the context of the video, the FBI has received reports of suspicious packages sent to various companies, highlighting the role of the FBI in monitoring and responding to potential threats to national security and corporate interests.

💡HHS

HHS stands for the U.S. Department of Health and Human Services, a government body responsible for protecting and enhancing the well-being of all Americans. In the video, HHS is mentioned as being impersonated in one of the variants of the suspicious packages, indicating a tactic used by attackers to gain trust and infiltrate systems.

💡Flash Drive

A flash drive is a portable data storage device that can be easily connected to a computer via USB ports. The video discusses how attackers use flash drives to deliver malware, emphasizing the potential risks associated with inserting unknown or untrusted flash drives into computers.

💡Hack Group FIN7

FIN7 is a cybercriminal group known for their sophisticated hacking activities. The video script mentions that the FBI discovered the flash drives were sent out by FIN7, illustrating the real-world threats posed by such groups and their use of deceptive tactics to compromise systems.

💡Dark Side and Black Matter Encryption Tools

These terms refer to advanced cybersecurity tools used by hackers, including encryption for secure communication and evasion of detection. The video's mention of these tools highlights the technical capabilities of cybercriminals and the challenges faced by security professionals in countering such threats.

💡Bad USB

A 'Bad USB' is a malicious device that, when connected to a computer, can execute harmful actions without the user's knowledge. The video describes how a seemingly ordinary flash drive can be a 'Bad USB' capable of causing significant damage to data, demonstrating the physical manifestation of cyber threats.

💡Arduino Pro Micro

The Arduino Pro Micro is a microcontroller board that can be programmed for various purposes. In the video, it is revealed that the 'Bad USB' contains an Arduino Pro Micro board, which is used to demonstrate the technical components of the malicious device and how it can be repurposed for hacking.

💡Keylogger

A keylogger is a type of surveillance technology that records every keystroke made on a keyboard. The video script mentions the use of a keylogger to record all keystrokes after the 'Bad USB' is connected, showing how attackers can capture sensitive information through such tools.

💡RAT (Remote Administration Tool)

A Remote Administration Tool, or RAT, allows an attacker to remotely control a computer. The video discusses the potential use of a RAT by attackers to gain unauthorized access, illustrating the broader implications of a successful cyberattack beyond simple data theft.

💡Social Engineering

Social engineering is the practice of manipulating individuals to divulge confidential information or perform actions that may compromise their systems. The video script describes how attackers use social engineering to convince victims to plug in the malicious flash drives, highlighting the human element in cybersecurity threats.

💡ssub

ssub is an online address verification platform mentioned in the video as a solution to prevent such attacks by verifying the authenticity of addresses in various industries. The video script positions ssub as a tool that can help reduce the occurrence of such attacks through enhanced verification processes.

💡Delayed RCE (Remote Code Execution)

Delayed RCE refers to a cyberattack strategy where the execution of malicious code is postponed until certain conditions are met, such as the computer being unlocked. The video script describes this tactic as particularly insidious because it can bypass security measures like computer locking, demonstrating the evolving nature of cyber threats.

💡Whitelist

A whitelist is a list of entities that are allowed access or execution in a system, often used in cybersecurity to control which devices or applications can interact with a computer. The video suggests using a whitelist as a protective measure against 'Bad USB' attacks, emphasizing the importance of proactive security strategies.

Highlights

Since August 2021, the FBI has received reports of several malicious packages sent to US companies in transportation, insurance, and defense sectors.

Packages came in two variants: one mimicking a message from HHS with COVID-19 protection guidelines and a flash drive, and the other imitating an Amazon gift package with a fake gift card and a 'lyo' USB flash drive.

The FBI discovered that the flash drives were sent by the hacking group FIN7, known for their dark side and black matter encryption tools.

The video demonstrates the disassembly of a malicious flash drive and its impact on a connected computer system.

Inside the flash drive is an Arduino Pro Micro board, which is not designed for soldering a full USB but was modified to do so.

The board was soldered with rigid wires and the USB plug was glued to the case to avoid suspicion.

The 'bad USB' is capable of causing irreparable damage to data and operates as a keyboard controller, capable of pre-programming keystrokes.

Upon connection, the flash drive executes malicious code from an attacker's server, indicating it's not a storage device but a keyboard input device.

The flash drive can be disguised in various forms, including a webcam or a USB cable, depending on the context.

Social engineering skills are often used to convince victims that the flash drive is authentic and not suspicious.

The video introduces Lucas from ssub, discussing prevention methods for such attacks, including online address verification.

ssub is a leader in online address verification, offering solutions for banking, finance, gambling, and other businesses.

The attack can be fast and unnoticed, with the hardware part sometimes using ready-made solutions like Hack 5.

The software part of the attack uses the Arduino built-in loader, which supports multiple refreshing and user application code.

Attackers may use a remote administration tool (RAT) to install a backdoor on the victim's computer.

A more terrifying type of attack involves inserting a flash drive into a turned-off computer to send keystrokes at a later time when the computer is unlocked.

Protection against such attacks includes using specialized software solutions that allow only pre-approved devices to connect.

The most important rule for protection is common sense and caution, not inserting unfamiliar devices into computers.

ssub is ready to help satisfy curiosity safely and win battles in the online jungle.

Transcripts

play00:09

[Music]

play00:18

since August 2021 the FBI has received

play00:21

reports of several packages that were

play00:23

sent to us companies in transportation

play00:26

insurance and defense the packages came

play00:29

in two variant

play00:31

one mimicked a message from HHS US

play00:34

Department of Health and Human Services

play00:36

with a letter inside with references to

play00:38

covid-19 protection guidelines and a

play00:40

flash drive with additional

play00:45

materials the other imitated a package

play00:47

from Amazon gift wrapped inside was a

play00:50

fake thank you letter a fake gift card

play00:52

and a lyo USB flash drive

play00:58

[Music]

play01:00

the FBI discovered that the flash drives

play01:02

were sent out by the hack group fin 7

play01:04

known for their dark side and black

play01:06

matter encryption Tools in this video we

play01:09

have taken apart such a flash drive

play01:11

connected it to a working computer

play01:13

recorded all the changes it made to the

play01:15

system and we will show you in detail

play01:17

how an attack can be organized against

play01:19

your company or against your family and

play01:21

most importantly you'll see how to

play01:23

protect yourself from this

play01:25

threet this video was created by the Su

play01:28

sub verification platform but more about

play01:31

suub in a bit oh yeah you've probably

play01:34

wondered who this mysterious voice is I

play01:37

think it's time to get acquainted my

play01:38

name is Elliot and I am your voice

play01:40

assistant who helps you survive in the

play01:42

online

play01:43

jungle well let's get back to our story

play01:47

it looks like an ordinary flash drive in

play01:49

fact it is the bad USB which is capable

play01:52

of causing irreparable damage to your

play01:54

data let's open it up

play02:01

[Music]

play02:03

as we can see inside there is an Arduino

play02:05

Pro micr board let's take a closer look

play02:09

this board clearly has but does not use

play02:11

a micro USB interface and as we can see

play02:14

in order not to arouse suspicion of the

play02:16

victim the connector was soldered to a

play02:18

classic USB plug and the board itself is

play02:21

obviously not designed for soldering

play02:23

full USB in this case they did the

play02:25

tricky thing the plug was glued to the

play02:28

case and the board was soldered with a

play02:29

pair of of rigid wires this was done to

play02:31

force the ejection of the stick onto the

play02:33

case and not onto the board so what does

play02:36

this very bad flash drive do let's check

play02:39

it out we have a computer that is not

play02:41

connected to a network and does not

play02:42

contain any important data the flash

play02:45

drive does not know that we now have a

play02:47

key logger running on this computer

play02:49

which records all keystrokes we will

play02:51

check the log of this program later but

play02:53

for now let's take a look at the

play02:54

computer

play02:55

screen immediately after connecting the

play02:58

execute window opens

play03:00

let's stop the recording and look at

play03:02

what was written in the startup window

play03:04

this command runs malicious code from

play03:05

the attacker server for example from a

play03:08

rented digital ocean virtual type there

play03:10

is no data on the fake flash drive of

play03:12

course moreover the behavior is clear it

play03:15

is not a flash drive but in this case

play03:17

it's the keyboard more precisely the

play03:20

device is programmed as a keyboard this

play03:22

can be checked in task manager now let's

play03:24

have a look at the log what do we see a

play03:27

miniature device with a keyboard

play03:29

controller immediately after connection

play03:31

performs random keystrokes the ability

play03:34

to pre-program these keystrokes is

play03:36

usually used to enter any OS command by

play03:38

using the corresponding hotkeys for

play03:40

example Windows r or alt F2 the most

play03:44

popular form factor of such a device is

play03:46

a flash drive but given the small size

play03:49

of the device it can be built anywhere

play03:51

whether it's a webcam or even a USB

play03:53

cable OMG cable the suitable device form

play03:56

is set by the context as the choice must

play03:59

be optimal in one situation or another

play04:02

in addition this attack requires social

play04:04

engineering skills in most cases the

play04:06

flash drive is essentially a decoy it is

play04:09

thrown in different ways in a letter in

play04:11

a parcel in a mailbox it's accompanied

play04:13

by letters which convince the victim

play04:15

that it's authentic and does not arouse

play04:17

suspicion the main thing for the victim

play04:19

is to plug the flash drive into the

play04:22

computer obviously once a flash drive

play04:24

attack occurs well it can be pretty

play04:27

tricky to undo it it is of course a

play04:29

hardware attack at the end of the day hi

play04:31

my name is Lucas from ssub and I'm going

play04:33

to tell you a little bit about how we

play04:34

can prevent some of these attacks from

play04:36

occurring in the first place you know

play04:38

what could lower the amounts of attacks

play04:39

that occur like this well by simply

play04:42

verifying the address in the beginning

play04:44

ssub is a leader in online address

play04:46

verification uh whether it be in banking

play04:48

Finance gambling or many other business

play04:50

types we're able to verify the address

play04:53

of someone through three main ways the

play04:56

first one being document upload

play04:58

basically taking in that utility bill

play05:00

that we're also familiar with something

play05:01

that we like to call geolocation which

play05:03

is essentially finding out where you are

play05:05

based on a number of factors without the

play05:07

document upload and the third option

play05:09

would then be access to government

play05:11

databases where available companies can

play05:13

then Implement these methods

play05:14

simultaneously or pick and choose which

play05:16

parts are going to suit your business

play05:18

best if you want to learn more about

play05:19

some sub's addressed verification

play05:21

Solutions as well as our other products

play05:23

please feel free to click the link below

play05:25

the attack is extremely fast as

play05:27

keystrokes are made quite quickly it's

play05:30

quite possible that the user will not

play05:31

even notice

play05:34

anything as a hardware part attackers

play05:37

sometimes use ready-made Solutions like

play05:39

hack 5 however a person who has heard at

play05:41

least something about rubber ducky May

play05:44

suspect Danger from the logo scattering

play05:46

around dozens of such flash drives must

play05:48

be cheap and widespread in fact such

play05:51

flash drives must become a consumable

play05:53

item it's true homemade solutions

play05:55

dictate their own limitations this table

play05:58

shows approximate prices for for devices

play06:00

that can be disguised as a flash drive

play06:02

and their compatibility with operating

play06:04

systems as you can see all this is

play06:06

extremely cheap and available in almost

play06:08

any country in the world the bigger

play06:11

problem is getting the casing usually

play06:13

criminals buy the cheapest flash drive

play06:14

of the right size and remove the

play06:16

contents leaving only the casing or they

play06:18

print the casing on a 3D printer as for

play06:21

the software part Arduino built-in

play06:23

loader supports multiple refeshing it's

play06:26

at Mega 32 u4 you can write to it the

play06:29

command repeatedly for each specific

play06:31

situation in essence you only need to

play06:33

fill it up with user application code

play06:36

it's not possible to extract such code

play06:38

from the flash drive which came into our

play06:40

hands but we have written a sketch that

play06:42

could perform all the functions recorded

play06:44

in the

play06:45

log now let's see what an attacker is

play06:48

likely to do to gain remote access the

play06:50

shortest way is to run a rat remote

play06:52

Administration tool that is to install a

play06:55

back door on the computer for example

play06:58

windows

play07:00

Linux each of the above commands is

play07:02

built in and as short as possible in one

play07:05

action it downloads and runs code over

play07:07

HTTP or better

play07:10

https before the attack the attacker

play07:12

most likely won't know what the

play07:13

restrictions are on the local network so

play07:15

there is no absolute guarantee of

play07:17

success the signal May simply not get

play07:19

through but the execution of the

play07:21

commands even in this case will give the

play07:23

attacker enough information first since

play07:26

the server address is given by name a

play07:28

DNS query will be executed the DNS

play07:31

system is distributed and the query from

play07:33

the victim's computer will usually be

play07:35

sent anyway if the hacker is using his

play07:37

own DNS Zone delegated to a subordinate

play07:40

server he will see the query in the logs

play07:42

this will be a signal that the flash

play07:44

drive was connected and the rce has

play07:46

occurred however this does not guarantee

play07:49

that network access is

play07:51

possible second if access to the

play07:54

internet is not restricted in any way

play07:56

the attacker's server will receive a

play07:58

HTTP request which can also be seen in

play08:01

the logs this will be a signal that a

play08:03

network connection is possible and that

play08:05

the hacker can remotely control the

play08:06

victim's

play08:07

computer however this does not guarantee

play08:10

that the security mechanisms of the

play08:11

operating system allow the execution of

play08:14

the remote control program nevertheless

play08:17

even if the attack fails the attacker

play08:19

will have information about the rules of

play08:21

access to the internet from the user's

play08:22

computer and their awareness of such

play08:24

incidents such information can be used

play08:27

in repeat attacks and there is an even

play08:29

more terrifying type of attack that is

play08:31

often overlooked an attack on a locked

play08:34

down computer imagine that someone came

play08:36

to your house for a visit or broke into

play08:38

your apartment when you weren't there or

play08:41

pretended to be a client in your office

play08:43

and being unnoticed he inserted a flash

play08:46

drive into the USB input of the turned

play08:48

off computer when the office system unit

play08:50

is pushed into a Dusty dark corner it's

play08:53

easy enough to insert something

play08:54

inconspicuously there and people won't

play08:57

notice anything for several years do you

play08:59

often look at the back of your computer

play09:01

at home but your mouse or keyboard can

play09:03

be replaced with an identical one that

play09:06

has a built-in bad USB but why do this

play09:09

if the computer does not work it's

play09:11

simple the criminal programs the flash

play09:13

drive to send keystrokes not immediately

play09:16

but every n hours or minutes to catch

play09:18

the moment when the machine will be

play09:19

turned on and unlocked this is called

play09:22

delayed rce as long as the PC is locked

play09:25

all clicks will go to the password input

play09:27

field and disappear I.E the attack will

play09:29

go virtually unnoticed in fact such a

play09:33

device makes useless all attempts to

play09:35

ensure security by locking the computer

play09:37

which everyone is so used to after all

play09:40

once left unattended a laptop can have

play09:43

such a device inserted into it and no

play09:45

matter whether the computer has been

play09:47

locked or not bad USB flash drive will

play09:49

try to perform clicks we mean arbitrary

play09:52

code at intervals of a few minutes hours

play09:55

or days and sooner or later the moment

play09:57

will definitely come when the PC will be

play10:00

unlocked then the malicious code will be

play10:02

executed and the hacker will get remote

play10:05

access and now let's talk about how to

play10:07

protect yourself probably the best

play10:09

protection here is to use specialized

play10:12

software Solutions allowing the

play10:13

connection of only pre-approved devices

play10:15

from the list a whit list each USB

play10:18

device has its own unique vendor ID and

play10:21

product ID which are listed on the Whit

play10:23

list all other USB devices including bad

play10:26

USB sticks will not be recognized by the

play10:28

OS this method perfectly protects not

play10:31

only from the attack described above but

play10:33

also from a number of other attacks and

play10:35

can generally keep working computers

play10:37

from a host of undesirable consequences

play10:40

and the most important rule is common

play10:42

sense and caution just as children must

play10:45

not talk to strangers the adults must

play10:47

not put any unfamiliar devices into

play10:49

their computers or you can do it only on

play10:52

a safe clean computer with no important

play10:55

data and no internet access if you're

play10:57

really curious well suub is always ready

play11:01

to help you satisfy your curiosity

play11:03

safely and win all these battles in the

play11:06

online jungle

play11:08

[Music]

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
CybersecurityMalware ProtectionUSB ThreatsHacking PreventionData SecurityFBI WarningCyber AttacksSocial EngineeringOnline SafetyTech Defense
هل تحتاج إلى تلخيص باللغة الإنجليزية؟