You are here: Home » Economy & Policy » News
Business Standard

USB devices can 'leak' information to hackers: study

90 per cent of them leaked information to an external USB device.


Press Trust of India  |  Melbourne 

USB, chargers, smartphones
Photo: Wikicommons

connections - the most common interface used globally to connect external devices to computers - are vulnerable to information 'leakage', making them even less secure than thought, a study has found.

Researchers from University of Adelaide in Australia tested more than 50 different computers and external hubs and found that over 90 per cent of them leaked information to an external device.

"USB-connected devices include keyboards, cardswipers and fingerprint readers which often send sensitive information to the computer," said Yuval Yarom, research associate at the University of Adelaide.

"It has been thought that because that information is only sent along the direct communication path to the computer, it is protected from potentially compromised devices," said Yarom.

"But our research showed that if a malicious device or one that's been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured," he said.

"That means keystrokes showing passwords or other private information can be easily stolen," he added.

Yarom said that this 'channel-to-channel crosstalk leakage' is analogous with water leaking from pipes.

"Electricity flows like water along pipes - and it can leak out," Yarom said.

"In our project, we showed that voltage fluctuations of the USB port's data lines can be monitored from the adjacent ports on the USB hub," he said.

Researchers used a modified cheap novelty plug-in lamp with a USB connector to "read" every key stroke from the adjacent keyboard USB interface. The data was sent via Bluetooth to another computer.

"The main take-home message is that people should not connect anything to USB unless they can fully trust it," said Yarom.

"For users it usually means not to connect to other people devices. For organisations that require more security, the whole supply chain should be validated to ensure that the devices are secure," he said.

The long-term solution is that USB connections should be redesigned to make them more secure.

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

First Published: Tue, August 15 2017. 12:36 IST