CSO Newsletters
What is a CSO?

Tag this story:

delicious

digg

reddit

Home > Archives > May 2006 >

Attack of the iPods!

MP3 players and USB drives can be used for more nefarious purposes than just carrying data out the door.

By Simson Garfinkel

E-mail this article  |  Printer friendly

Advertisers

The AutoRun threat is very real and has been exploited on a massive scale.

A lot has been written about the threat of iPods, digital cameras and USB memory sticks to information security programs. Because all of these are basically high-capacity storage devices, they make it easy for thieves (whether insider or outsider) to slip into your organization, quickly download a bunch of confidential docs, and then slip out—and all the while, you thought that they were just enjoying some groovy tunes. Thieves can hide corporate secrets on the SD card of a digital camera, and if they want to be really sneaky, they can even delete the files so that the information won't show up during a casual inspection. Then, when they get home, they can use an "undelete" program to recover the secrets.

But there is another important threat that portable storage poses to today's information systems. Plug an iPod or USB stick into a PC running Windows and the device can literally take over the machine and search for confidential documents, copy them back to the iPod or USB's internal storage, and hide them as "deleted" files. Alternatively, the device can simply plant spyware, or even compromise the operating system. Two features that make this possible are the Windows AutoRun facility and the ability of peripherals to use something called direct memory access (DMA). The first attack vector you can and should plug; the second vector is the result of a design flaw that's likely to be with us for many years to come.

It's a Bug, Not a Feature

AutoRun is the feature built into Windows that automatically runs a program specified by the file "autorun.inf" whenever a CD-ROM, DVD or USB drive is plugged into a Windows-based computer. The feature exists so that software makers can have pretty splash screens appear on the computer when the installation CD-ROM is placed into the drive. Unfortunately, there are few, if any, restrictions placed on what AutoRun programs can do—as far as Windows is concerned, it's just another program that the user is running. So if a bad guy puts a nasty program onto a USB stick and can then convince one of your hapless users to plug that stick into their Windows-based computer, that bad guy has found a great attack vector for compromising your machines.

AutoRun is just a bad idea. People putting CD-ROMs or USB drives into their computers usually want to see what's on the media, not have programs automatically run. Fortunately you can turn AutoRun off. A simple manual approach is to hold down the "Shift" key when a disk or USB storage device is inserted into the computer. A better way is to disable the feature entirely by editing the Windows Registry. There are many instructions for doing this online (just search for "disable autorun") or you can download and use Microsoft's TweakUI program, which is part of the Windows XP PowerToys download. With Windows XP you can also disable AutoRun for CDs by right-clicking on the CD drive icon in the Windows explorer, choosing the AutoPlay tab, and then selecting "Take no action" for each kind of disk that's listed. Unfortunately, disabling AutoPlay for CDs won't always disable AutoPlay for USB devices, so the registry hack is the safest course of action.

AutoRun isn't just a problem for Windows. Back in the 1990s the Macintosh had a similar feature called Autostart that automatically ran QuickTime 2.0 files; Apple removed the feature from the operating system after the so-called Hong Kong virus (formally known as Autostart-9805) spread to thousands of computers in 1998. Likewise, the Palm operating system has a similar feature that automatically gives every program on an SD card the chance to run when that card is plugged into the expansion slot of a computer running PalmOS.

The AutoRun threat is very real and has been exploited on a massive scale. The Rootkit/spyware combination that Sony Music distributed last year on millions of compact discs was installed as part of an AutoRun script. Spyware was installed on Windows-based PCs all over the world. It turns out that the music CDs also included spyware for Macs, but on MacOS the spyware needed to be manually installed, and few Apple users bothered.

But as bad as AutoRun is, there's a vulnerability built into practically every desktop computer and server that's currently in use—and this is a vulnerability that affects PCs running Windows, Macs and quite possibly machines running Linux or even Solaris. The vulnerability is based on the direct memory access facilities built into the FireWire and USB standards.

<< Previous ||  1  2  || Next >>


Add a Comment:

Your comment will be displayed at the bottom of this page, at the discretion of CSOonline.

* Name:

* Title:

* Corp:

* E-mail:

* Subject:

* Your Comment:

 
* Required fields.

We do not post comments promoting products or services.
Comments are owned by whomever posted them. CSO is not responsible for what they say.
Selected comments may be published in CSO magazine.
We will not sell your personal information.
We do display your name, title, and corporation but not your e-mail address.





Most Recent Responses:

I'm sorry, this is just not true.

Most USB Devices do NOT autorun on Windows.

See: http://www.microsoft.com/whdc/device/storage/usbfaq.mspx

In short, any device listed as a USB removable media device (almost every usb stick out there, ipods, etc) cannot autorun.

Disabling autorun is a good idea as it's possible to use special usb hardware for this purpose, but finding the right stuff is actually pretty hard.

Yes, the attack presented last year at Cansecwest was incredibly impressive (it was especially fun watching the ipod blank the video screen--they didn't actually use it to grab a screenshot), but those attacks were (ironically, given Windows track record) all unsuccessful against Windows operating system. I don't remember the exact details, but it was one of the BSD operating systems that was shown vulnerable.

The USB driver threat is probably the most realistic threat, and that requires development hardware and a pretty knowledgable attacker. And of course, disabling autorun does nothing to stop that.

Jordan Wiens
Senior Security Engineer
University of Florida
Email
Print

Excellent article by Dr. Garfinkel. I applaud his efforts to educate the public about these growing risks related to the proliferation of cheap USB and firewire devices (e.g. iPods). I have posted additional stories and links related to this topic at my web site: http://www.sharp-ideas.net

Abe Usher
Security Engineer
Sharp Ideas LLC
Email
Print

Ads by TechWordsSee Your Link Here