back to article Between you, me and that dodgy-looking USB: A little bit of paranoia never hurt anyone

Arriving at a recent conference organised by one of the government's many regulatory bodies, I received my obligatory lanyard – and something else, credit-card-shaped, emblazoned with the branding for event. "What's this?" I asked. "Oh, that's a USB key." I presume the conference organisers mistook my wild-eyed stare of …

Page:

  1. Real Ale is Best

    It'll only get worse

    Once USB-C (3.1) sticks become more common, security threats will only increase.

    As you can route PCI over USB-C, goodness knows the sorts of attacks that could then be carried out.

    1. IceC0ld

      Re: It'll only get worse

      one more, and I'll stop - PROMISE :o)

      TITSUP

      This Is The Safe USB Present .................................

    2. DuncanLarge Silver badge

      Re: It'll only get worse

      "As you can route PCI over USB-C"

      Oh f*ck

  2. Doctor Syntax Silver badge

    You're dealing with marketroids & PR.

    These are the folk who will keep sending out emails which exactly emulate phishing emails to customers and would-be customers. Emails, even, warning their customers of the dangers of phishing. They'll keep doing that until you prise their keyboards from their (hopefully) cold, dead hands.

    Given half a chance they'll hoard customer details contrary to GDPR until they earn their employers multi-million quid fines.

    They'll make every effort to force ads onto people who make abundantly clear by using ad blockers that ads are unwelcome and hence hugely counter-productive.

    They lobbied Bambi's govt to make exceptions for existing customers to let them bypass TPS and make those calls despite use of TPS should send the same message as ad-blockers.

    They're the biggest single risk to their employers in terms of pissing off potential and existing customers and in attracting GDPR fines.

    You're never going to talk sense into them.

    1. oiseau
      Stop

      Hello:

      You're dealing with marketroids & PR.

      Indeed ...

      But these utterly despicable abortions of nature respond to a boss, who in turn responds to management, who in turn responds to upper management, who in turn responds to the board who in turn ...

      I'm sure you get the idea.

      To all these shitheads it's all about the money (moolah, dough, wonga, bread, etc.) and only about the money and up to a point in makes sense: if they do not get the results expected from them, they are out of a job.

      None of these minions serving the upper echelons give a monkey's toss about what their actions mean or their consequences.

      So they just do as they are told, instead of putting spokes in the wheel, like I was once told I should and was then promptly sacked.

      Business ethics? Corporate responsability and accountability?

      Yes, they've surely heard of all that at some time or another but these have long ago become abstract values.

      Cheers,

      O.

      1. Loyal Commenter Silver badge

        But these utterly despicable abortions of nature respond to a boss, who in turn responds to management, who in turn responds to upper management, who in turn responds to the board who in turn ...

        ...more often than not come from a background in marketing and PR.

        There's your problem, right there, and it's cultural, not technical or political in nature.

    2. Anonymous Coward
      Anonymous Coward

      You're dealing with marketroids & PR.

      I've spoken to them about this - they are NOT going to give away USB sticks at the next conference, instead they will email everyone the information ... I believe it will be called README.XLS

      Happy Now?

      You really think anything will change?

      1. Snowy Silver badge
        Facepalm

        No the information should be in the email, an attachment is also a no-no!

      2. John Smith 19 Gold badge
        Unhappy

        Easier when such items were passive things that needed the intelligence in a reader

        IE a DVD or badge with an optical code.

        As Edward Snowden should have taught everyone you can pack a lot of hardware in a USB stick.

        Should be just some storage.

        Could be.......

    3. Anonymous Coward
      Anonymous Coward

      Meanwhile, at our $BIGCORP...

      1. E-mail received about warning about phishing attempts from external e-mail addresses targeting people by their name and encouraging them to click on a link. Do not click on the link, do not enter account details such as username or password, report as spam.

      2. Followed by an e-mail sent from an external company to me about an anonymous employee survey, participation is very strongly encouraged, and please click here.

      You couldn't make it up, etc...

      1. imanidiot Silver badge

        @AC

        Promptly and "in good faith" report the email as attempted phishing to your corporate GDPR/data security officer. Have your coworkers do the same. Someone will get a/the message when the poor guy goes ballistic.

        1. Gene Cash Silver badge

          Re: @AC

          > report the email as attempted phishing

          Yup. This. I see stupid stuff happen all the time, and people just facepalm without telling anyone that can do anything about it.

          The amount of "WAIT. WHAT?!" faces and "well that stops now!" I've gotten when I've asked "do you know about [stupid thing]?"

        2. stevebp

          Re: @AC

          There was a saying in a bank I once worked in that, "if you want to get the monkey off your back, call in Audit or Infosec". Unsurprisingly, it works very effectively.

      2. Captain Scarlet
        Coat

        Delete the email and when asked why you didn't fill in the "anonymous" survey forward them to the first point and arrange retraining for them.

      3. Antron Argaiv Silver badge
        Facepalm

        My company was recently acquired.

        I was given a new email address and a new web-based email account <my_name>@BIGCORP.COM

        The *very first* email in my new inbox, was titled "Mandatory Security Training!" and came with a link, which I stupidly clicked and entered my newly provided credentials, only to be informed that this had been a phishing email from their "IT security team" and that I had failed.

        So, like a good boy, I went to change my password.

        "Password cannot be changed because you have had this one for less than 7 days"

        1. Anonymous Coward
          Anonymous Coward

          click on the "I forgot my password" link instead?

        2. billdehaan

          Had a new co-worker with something similar. When he clicked the "Mandatory Training" email, and was reprimanded for clicking on a spammy link. A spammy internal link, but still, he should have forwarded it to the internal security "check link for validity" service, which no one was using.

          It turned out he actually had. Being a new employee, he'd followed the policy verbatim.

          It turned out that the suspicious link account that you were supposed to forward links to had its' spam filter cranked up to maximum sensitivity. In other words, the suspicious link checker account blocked all incoming links that were suspicious from being seen by the team that was supposed to check them. Which of course explained why "no one used it". People in fact had been using it for months, but all their emails had been deleted before being read.

          Management then asked why no one noticed or commented on the fact that IT had not responded to their submissions. "We're so used to being ignored that it didn't seem worth mentioning" was the answer, much to the shock of executives.

      4. Version 1.0 Silver badge
        Unhappy

        $HOSPITALS often outsource their purchasing and payment systems these days, I just rip my hair out when they email us PAYMENT.HTML and PO#76293.HTML documents ... if you deal with China then you're used to getting New_Order.XLS files too, and of course when my customers need to send a picture of something it's always PICTURE.DOC ... these are real, not fake - they come in every week.

      5. MacroRodent
        Facepalm

        re surveys

        > 2. Followed by an e-mail sent from an external company to me about an anonymous employee survey, participation is very strongly encouraged, and please click here.

        Wonder if you work in the same $BIGCORP as me. Happens here all the time...

      6. Anonymous Coward
        Anonymous Coward

        1. E-mail received about warning about phishing attempts from external e-mail addresses targeting people by their name and encouraging them to click on a link. Do not click on the link, do not enter account details such as username or password, report as spam.

        2. Followed by an e-mail sent from an external company to me about an anonymous employee survey, participation is very strongly encouraged, and please click here.

        You must be at IBM...

      7. Anonymous Coward
        Anonymous Coward

        pay no attention to the hack behind the link...

        At $WORK we get the corporate (IT "InfoSec") -sponsored phishing attempts too, with dire warnings of how many employees still fall prey, and then inevitably followed by even more security theatre measures which do more harm than good.

        Status quo, right? Everybody has this now, and "InfoSec" departments push their agenda with scare tactics and bogeymen more than ever.

        And yet, they don't seem to be able to manage the obvious common sense things. E.g. $WORK uses a common SaaS IT ticket tracking system -- you've heard of them, they're awful. But the real point is that they're awful outside of $COMPANY's borders and control, meaning that any corporate intellectual property in an IT ticket is on the internet.

        Same with some of the doc/publishing suites (Engineering product plans in o365 Sharepoint, anyone?) and even source code in some cases.

        So yes, don't click those scary phishing email links from "InfoSec", but do share the company jewels with the cloud.

      8. billdehaan
        WTF?

        And in the same email, too

        Several years ago, our IT send out one of their OMG world-is-ending ALL CAPS blanket emails to the company.

        To summarize, it said:

        "A new malware attack is being spread through malformed URLs in email links. Our firewall is currently not configured to protect against these types of attacks, and we are currently waiting for a fix from the vendor. In the meantime, employees are not, under any circumstances whatsoever to click on any external links. Disciplinary action will be taken against those who fail to comply with this mandate.

        You are required to confirm that you have read, and understood this new mandate. You must sign the electronic form at www.externalcorp.com/signatures.asp no later than Friday. Failure to comply will result in disciplinary action, including termination".

        Yes, employees were required to click an external link in order to promise not to click on internal links. With both actions being grounds for dismissal.

      9. HWwiz

        We employ an external company to actually email our employees with HoneyTrap emails.

        IF they click on links in that email, then they have to go on a security awareness course.

    4. Terry 6 Silver badge
      FAIL

      God yes. Who hasn't had an email from their banks with a "click here" rectangle for customers to log in and learn about some new trick with their account. In effect training the public to open an unsafe link and type in their security details. Why's there no hands up in despair icon?

      1. Doctor Syntax Silver badge

        "Who hasn't had an email from their banks with a "click here" rectangle for customers to log in and learn about some new trick with their account."

        Me for some time now. I reported a number of these to their phishing report helpline. I eventually emailed that or some similar address than in the continued absence of any reply I'd discontinue the email address set up specifically for said bank. No reply so I gave them the chop. They don't seem to have noticed their emails bouncing.

      2. Anonymous Coward
        Anonymous Coward

        Who hasn't had an email from their banks with a "click here" rectangle for customers to log in and learn about some new trick with their account.

        I haven't seen such from Kiwibank. Westpac - some of their emails have been known to be virtually indistinguishable from known phishing attacks.

        And one bank in NZ displays 3rd party advertising (or used to), AFTER your log-in. With won't say which Bank that is, but that they're a Bank in New Zealand. A couple of characters should be able to figure that out...

    5. Anonymous Coward
      Anonymous Coward

      Ugh don't remind me. It isn't just PR and marketroid people.

      Once upon a time, at a big corporate firm I worked at, we had the "report this email as phishing" button, which we were to use if a suspicious email shows up.

      anyway, one day, I started getting emails from the "IT Security department", asking me to click on a link with their updated security policy on it.

      Thing is:

      - The email headers did not match the domain in the "to" field, nor did it match the name of the sender.

      - The email headers showed not the company domain, but some generic sounding one I had never heard of, and the company search engine did not return any results for the domain

      - The email was generically written, not even my name in it

      - The URL that I was to click on was on yet another third party domain, which was a complete unintelligible alphabet soup of a domain, with long strings of what looked like random characters, ending in ".doc"

      Knowing about doc macros, exploits, etc.. there was no way I was going to click on the link while on the corporate windows box, and the entire thing smelled like a phishing email (and who better to impersonate than the IT security staff, a lot of people would listen to them just because they are the "IT security" people).

      so I promptly clicked the "report phishing" email, and was on my way. I did this repeatedly over the course of two weeks, until my manager called me into his office.

      Apparently the head of the IT security team was livid with rage because their important IT security policy was being flagged as a phishing email (apparently if someone flags an email as "phishing", all the other people get a "this might a phishing email" header on the email, so they don't click on it, because it can be grounds for termination of you knowingly infect the company).

      Apparently the random letters are a tracking ID for my account, so they know that (a) I am the one reporting the email, and (b) I haven't read the document yet.

      All my points about how it looks like a phishing email were accepted by my manager, then immediately overruled.

      I was told that the email is safe, and that I should stop reporting it as phishing, and more to the point that I should click on the link to view the policy.

      So I did what I was told, and the first page of the IT policy was about the risks of phishing emails, and what to look out for (which was almost the exact same criteria I reported the email for), without a hint of blasted irony from the "IT security" team.

      So now, I have to assume that no matter how dodgy an email (or its attachments) look, I have to trust it if it says "IT security team" on it. Talk about blowing a gaping hole in a companies security policy. Seeing as all future emails I have since received from the security team are still looking like a phishing email, I can see my complaints fell on deaf ears, and there were no repercussions for them.

      My point is, we have a long long way to go before "best practices" can be considered in security. Companies still don't get it, if even their security teams are not able to make an email seem legitimate. Instead you get in trouble for "showing up" the security team.

      I feel that they are only doing this "IT policy" and phishing email training to "tick a box" on their cybersecurity checklist. They don't actually care about security or preventing phishing. It is a "cover your ass" ploy from legal, nothing more.

      As long as attitude like that is prevalent in companies, nothing will get better, and it may well get worse. You can't expect the PR and marketroids to be any better when the culture they work in encourages such behavior.

      1. Doctor Syntax Silver badge

        "So I did what I was told"

        It depends on what you were told. If I was told to report emails with phishing characteristics I'd have continued to do it. What's more, back in the day, they'd have known I'd have continued to do just that.

      2. hmv

        "listen to them just because they are the "IT security" people"

        ROFL

    6. Anonymous Coward
      Anonymous Coward

      They'll keep doing that until you prise their keyboards from their (hopefully) cold, dead hands.

      You should NEVER, under any circumstances, kill a marketing or PR droid and then take their keyboards from them.

      It is far better, and far FAR more enjoyable, to take their keyboards from them while they're living and then apply said keyboard in an appropriate manner until both cease to function! (unless it's a really good keyboard, in which case find something else for said application).

  3. Semtex451
    Holmes

    Was this article crafted to be sent to our 'superiors'?

    Only I'm not sure it was intended for your typical El Reg reader

  4. Spanners Silver badge
    Holmes

    Did you accept the USB?

    Perhaps it was a test, a bit like the fake phishing emails.

    1. A.P. Veening Silver badge

      Re: Did you accept the USB?

      Accepting the USB isn't a problem, plugging it in your computer is. Unfortunately, USB sticks are just a bit light to properly work as paper weight.

      1. Adrian 4

        Re: Did you accept the USB?

        Would make for a nice point in a talk about security : get answers to the following questions and then comment on the results :

        1. Did you accept a free USB stick at the entrance ?

        2. Are you going to put it in your device ?

        3. Are you going to give it to another employee, or to a family member ?

        4. Did you accept a free coffee ?

        5. Did you accept a free brownie (cake, not human) ?

        6. Did you pick up a brownie you saw on the floor and eat it ?

        7. Did you accept and read the glossy literature ?

        8. Did you accept the cute air freshener to hang in your car ?

        9. Did you accept the promotional item modelled on a presidential seal ?

        We're accustomed to dealing with most of these threat models. Mostly without errors, but occasionally we screw up.

        1. Martin Gregorie

          Re: Did you accept the USB?

          Acceptable answers to:

          1. Did you accept a free USB stick at the entrance ?

          2. Are you going to put it in your device ?

          are

          (a) No

          (b) Yes, and I'm going to reformat it before I mount it or give it to anybody.

          Anything else shows insufficient paranoia. But of course (b) requires that you know how to reformat it and that you are running an OS that gives you the option of reformatting a USB device before its filing system is accessed.

          1. FrogsAndChips Silver badge

            Re: Did you accept the USB?

            Reformatting won't protect you against malware at the firmware or chip level.

            1. the_rob

              Re: Did you accept the USB?

              > Reformatting won't protect you against malware at the firmware or chip level

              I'm just going to jump in with a shameless plug for a pet project of mine - an open-source USB hardware firewall.

              https://github.com/robertfisk/USG/wiki

              It allows only known-good USB commands to pass, thus blocking BadUSB type attacks. (The filesystem may still be infected but a reformat will take care of that.) It is designed exactly for the scenario of someone handing you an untrusted USB stick and expecting you to plug it into your system.

              The firewall runs at USB-1 speed for now, but a little bird says check back in a month or two if you need more speed.

              1. Anonymous Coward
                Anonymous Coward

                Re: Did you accept the USB?

                The firewall runs at USB-1 speed for now, but a little bird says check back in a month or two if you need more speed.

                The project looks great, and as someone who has had to work with untrusted USB's many times (cheap (thus disposable) laptop running Linux, later a Pi-like device), the device project looks great and is has replaced one of my presents-to-self for early next year :)

                One question... Would your device manage and shielding against USB killers (ie those things that dump a hefty chunk of volts into the data lines)?

                1. the_rob

                  Re: Did you accept the USB?

                  > Would your device manage and shielding against USB killers (ie those things that dump a hefty chunk of volts into the data lines)?

                  The firewall will provide some protection against USB killers, simply because the voltage spike has to pass through 2 ESD clamps and 2 microprocessors before reaching your computer. So the firewall will be destroyed, but your computer may be saved.

            2. Doctor Syntax Silver badge

              Re: Did you accept the USB?

              "Reformatting won't protect you against malware at the firmware or chip level."

              Especially when you can't reformat it because you didn't accept it.

            3. Anonymous Coward
              Anonymous Coward

              Re: Did you accept the USB?

              Formating won't protect you from the USBKiller. Perfect security device, though, permanently disables the port. https://arstechnica.com/gadgets/2016/12/usb-killer-fries-devices/

          2. Loyal Commenter Silver badge

            Re: Did you accept the USB?

            But of course (b) requires that you know how to reformat it and that you are running an OS that gives you the option of reformatting a USB device before its filing system is accessed.

            That's little use if it presents itself to the USB bus as something other than a file system, for example as an input device.

            1. LateAgain

              Re: Did you accept the USB?

              Better yet a network device, with drivers you know are in Windows. Become the default route and do what you want.

        2. Real Ale is Best

          Re: Did you accept the USB?

          Have a look at this hack.

          Even QR codes are dangerous.

          1. Mage Silver badge
            Alert

            Re: Even QR codes are dangerous.

            Ages ago I was tempted to put replacement QR codes at all the labels in Tesco veggie section. I noticed recently they are gone.

            You mean especially QR codes are dangerous?

            I managed to find an app that reads them (and other barcodes) and only decodes & displays, with an option to save it or create a Firefox tab. Most phones seem to open the browser directly.

            I despise people using obfuscated short codes (invented for Twitter and no longer needed there?). 1: The short code provider knows your IP, the time, your browser, OS and previous web site. 2: You have no idea what it will load.

        3. Version 1.0 Silver badge
          Joke

          Re: Did you accept the USB?

          5. Did you accept a free brownie (cake, not human) ? My answer, "Yes, I ate a Brownie"

      2. Anonymous Coward
        Anonymous Coward

        Re: Did you accept the USB?

        Go and test it at your local library.

      3. Sureo

        Re: Did you accept the USB?

        "plugging it in your computer is"

        Find someone else's computer to plug it in to, preferably one of theirs.

    2. Anonymous Coward
      Anonymous Coward

      Re: Did you accept the USB?

      Why not? Use it as a training exercise for a forensic examination...

  5. Duncan Macdonald

    A paranoid mount option ?

    What is needed is a paranoid mount option for USB devices - the OS would report to the user what the device says it is but would not execute any code on the device. If the device presents as having storage then a full virus scan would be executed on the storage and the results displayed. The files (if any) on the device would not be accessible until after the virus scan and the user acceptance of the scan result.

    To allow for the possibility of a USB bricker device, all data and power lines should be protected by zener diodes (clamp data to +5.5v/-0.6v and power to +(maximum charging voltage +1 volt)/-0.6v)

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like