Solved

AV Detect BadUSB?

Posted on 2014-10-03
1
500 Views
Last Modified: 2014-10-08
So I reading various tech articles about the USB flaw known as BadUSB (malware embedded in firmware) and that the code was recently posted on GitHub.  As a result, there's hysteria and suggestions not to use USB connected devices.  That's not very practical and I wanted to know if AV apps would detect such malware?
0
Comment
Question by:markbyrn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40359665
If a device tells windows "I am a keyboard", then windows installs it and that device is ready for action. So if that fake keyboard starts typing in a command shell, windows cannot distinguish if this is the user or not, nor can the AV software. So the code typed there will be executed.

There are 2 measures to be taken:
-lock your screen when absent
-use software that only lets whitelisted USB devices work on your machine.

The latter can be done by GPOs. It can also be done with external softwares, amongst them AV software.
But it will be a real pain to administer, so the best solution stays "lock your screen!".
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question