BADUSB-BASED ATTACKS

Authors

DOI:

https://doi.org/10.31891/2219-9365-2023-76-17

Keywords:

BadUSB, BushBanny, flash drive, LANTurtle, RubberDucky, USB device, attack, vulnerability, threat, protection method, host

Abstract

This paper discusses the general principles of the BadUSB-based attack. This attack exploits vulnerabilities in USB devices to infiltrate malware and attack computer systems. The BadUSB concept is based on modifying the USB device controller software, allowing attackers to change the functionality of the device. For example, to simulate different types of devices, such as a keyboard, mouse, network adapter, etc., to perform various malicious actions. Attackers/hackers can use BadUSB to run malicious code on a host computer. This allows for data interception, remote control, malicious commands, and other malicious operations on the infected system. The BadUSB attack can be used to carry out a wide range of attacks, bypassing traditional security methods. One of the main methods of protecting against BadUSB attacks is to restrict access to USB ports and use access control mechanisms for devices that are connected to the computer. It is also important to keep USB devices' software up to date. To reduce the risks, it is necessary to constantly update security systems and implement control measures to prevent possible attacks via the USB interface. BadUSB is defined as a threat that requires attention and further research to develop more effective methods of detecting and protecting against such attacks while maintaining the functionality of USB devices. However, BadUSB is not limited to imitating peripherals. There are known cases of this attack targeting USB drives and other devices that use a USB connection. Attackers/hackers can insert malicious code or patch software on these devices to perform attacks aimed at stealing or deleting confidential information. Protecting against BadUSB requires a comprehensive approach, including improving the hardware and software security of USB devices, as well as user awareness of possible risks and protection methods. The development of new technologies and authentication methods also plays a key role in providing security against this new threat.

Published

2023-11-30

How to Cite

KORCHYNSKYI В., TARASENKO І., BIELOVA Ю., RATSYBORYNSKYI С., & AKAIEV О. (2023). BADUSB-BASED ATTACKS. MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, (4), 134–139. https://doi.org/10.31891/2219-9365-2023-76-17