Jailbroken Devices Compromised By Charging Stations 93
mask.of.sanity writes "Data can be stolen from Windows, Android and Apple devices by unassuming power charging towers. In an attack demonstrated at the Defcon hacking conference, mobile phone charging units were rigged to pull data from phones plugged into them. Researchers found many jailbroken and modified devices activated USB functions when they were plugged in, or simply rebooted."
Er... how can Android be jailbroken (Score:2, Interesting)
Nitpicking here... An iPhone that is jailbroken has its security compromised where anything is possible via the USB connection. However, an Android device that has root still has its security mechanisms 100% intact unless someone automatically checks "yes" everytime the su dialog pops up, or has a really craptastic ROM.
Yes, some ROMs might allow for a root prompt to allow a hacked charger to slurp data via ADB, but this can be easily disabled by just turning debug mode off.
Re:Er... how can Android be jailbroken (Score:5, Interesting)
1. Moreover, there is quite a bit you can do with adb even without root: the adb shell normally gets privileges that are higher than those ordinary non-system Android apps get, though lower than full root privileges. (E.g., you can silently install and deinstall arbitrary apps from an adb shell.) So keeping debug on and plugging into untrusted devices is probably not such a great idea, whether the device is rooted or not. Moreover, if debug is on, then even if the device isn't rooted, an attacker can often just silently install an app that roots the device via whatever vulnerability roots a given device, and then get full root privileges.
2. The Superuser app that I use can be set so that it remembers su permissions after the first time one is asked and doesn't ask again if the same app requests the permission (technically, it will ask again if the app requests the permission in connection with another su command, but most root-using apps just request permission for an su shell, and then do their work in the shell). I keep that setting active, since I do things that require root so often (my SuperDim app to dim the display below what the OS normally allows for use at night; on boot setting the exec permission on my SD card so I can move app libraries to it; adjusting CPU governor settings; using my Force2SD app to move recalcitrant apps to SD; running a script to do a tar backup of all of /data; etc.). It would be a real nuisance to be constantly prompted. But there is an obvious security cost to the convenience. I am willing to accept that cost, especially since I currently use only two root-based apps that I didn't write myself, and I think they are trustworthy apps. So only two apps that I didn't write have the silent su authorization enabled.
Re: (Score:2)
Keeping Debug on is not a good idea.
Plugging it into an unknown or untrusted device is an even worse one.
An Android user who keeps debug on probably knows enough to not plug it into strange charging devices.
Re: (Score:3)
Yes, but see how they worded the threat?
If you have done something to totally drop security on your magic data port, then something you connect to that port that you do not understand can pwn your gifs.
Pretty simple really.
Same deal with flying. You're okay until someone lets the snakes loose.
Re: (Score:3)
Hmm (Score:5, Insightful)
So basically, you connect an untrusted device to a device you trust somewhat, and you're shocked when bad things can happen?
It's like people who would pick up a random USB drive off the ground and then plug it into their computer without taking precautions. Why is this any different?
Re:Hmm (Score:5, Insightful)
I'm not sure if your USB drive example is a good comparison to this situation. Charging stations are being commonplace and showing up in airports, coffee shops, etc. Businesses that people trust.
I think think this is more like a fake ATM machine. People are so used to ATMs being everywhere, that little thought is given when they enter their PIN number into one. It's not something that the average person is going to think twice about.
Re: (Score:1)
Re: (Score:2)
Dropping USB sticks in a corporate car park is a well known method of getting malware into that company.
Re: (Score:3)
Simple solution: Get a USB extension cable which only has power connections, not data.
Re: (Score:2)
*golf clap*
You're so awesome, and your points really make a difference in the real world.
Re: (Score:2)
I would plug in a random USB drive. It's a USB drive. It gets no special privileges, this isn't firewire and anyway in 2011 we have IOMMU so even if it was (which it isn't) allowed to initiate DMA transactions it doesn't get to look anywhere the OS doesn't want it to.
If your OS is dumb enough to assume anything plugged in should be privileged and get to execute code then that's an OS security problem, nothing to do with me.
http://www.h-online.com/open/news/item/USB-driver-bug-exposed-as-Linux-plug-pwn-1203617.html [h-online.com]
Re:Hmm (Score:5, Interesting)
Tell me this... does this amazing OS of yours alert you when you plug in a new USB keyboard? Because some of the USB sticks people find on the ground have both a flash memory partition and a fake keyboard interface that sends key commands in a predefined manner.
I'm all for OSes that fingerprint all your USB devices and require you to validate each function of each interface the first time presented, but even OpenBSD doesn't do this by default.
Re: (Score:1)
Re: (Score:3)
In technical terms, you are correct. But the belief was that this was a power station, not something intended to compromise. True that it caught people unaware. It would have caught me unaware. It goes to show that using complex connectors for power isn't such a great idea since it requires trust which people are unaware they are giving.
This has given me cause to pause. I just checked my phone. It's default setting on reboot is for USB connections to prompt on the phone what to allow. USB debugging i
Re: (Score:2)
It's just about like trusting that a power outlet will deliver the voltage and frequency it claims to, and not something else that will blow up your device.
Re: (Score:3)
The analogy only works in part. In your case, your maximum possible loss is the device itself and any data not properly backed up. In the case explained in the article, the exploit means that your data ends in untrusted hands.
Of course, it depends a lot of the nature of the data that you have in your phone. For my phone, it would be a greatest setback breaking the device than making public any data held in it. But maybe some other people has in their smartphones the numbering of their secret banks accounts
Duh (Score:1)
I made my mp3 player play through an old tape deck yesterday I must be a genius.
Re:Duh (Score:5, Informative)
What you need is a USB CondomCable with the D+ and D- pins shorted together. No data can flow, and if the bad guys didn't bother to try and implement proper power protocol, you'll get the added satisfaction of frying THEIR hardware when your phone cranks up the juice and tries to suck down 1.7A instead of politely sipping 100mA. Just don't ever use such a cable by mistake to connect your phone to a pc or laptop belonging to yourself or a friend.
Re: (Score:2)
If the D+ and D- lines are shorted in the cable itself, then it will draw as much current as the host can source, all the time. Your phone has no control over whether that number is 100 mA or 1.7 A. Furthermore, shorting the D+ and D- lines together is highly unlikely to damage the host. It's not like hackers are fabbing their own substandard chips. If you really want to make a cable that will kill the host, without being as obvious as sticking a USB connector on to the other end of a 120 VAC cord, you
Re:Duh (Score:4, Informative)
I don't think he meant that the d+/- lines were what fries the host, he was indicating that the phone wouldn't think it's connected to a computer and it would draw higher amps because it thinks it's hooked up to just a charger. So if the host didn't limit amps and it's wires weren't rated for 1.7A, then it would result in them overheating and hopefully damaging something.
The whole purpose was to make a connector that actually works, not something to destroy the host. The ancillary prize was damaging hosts if they were advertised as just a charger and they really weren't.
Re: (Score:2)
The USB spec limits negotiated current to a max of 500mA (I think).
Any sort of active device will have some sort of hub inline and it should simply shut that port off if it goes into overcurrent.
Re: (Score:2)
Yeah but in practice, chargers don't limit their current to 500 mA. See: http://www.ladyada.net/make/mintyboost/icharge.html [ladyada.net]
Re: (Score:2)
China has an official government standard for micro-USB charging that basically says, "if the data lines are shorted together, the client can legitimately assume that the host is a charger capable of supplying 1.7 Amperes". By virtue of everything coming from China, that basically means that there's now a worldwide standard for the same. However, most cheap USB chargers DON'T short the pins together, because then they'd have to have a regulator with proper heatsink capable of supplying up to 1.7A continuous
Re: (Score:2)
The danger is though that the power supply is well-protected. Most cheap USB power adapters may only be able to provide 500mA. Sure, if you try to draw 1A, they can try to supply it (provided the voltage rails don't dip too low), until something burns up. Usually the regulator as at 500mA it can survive with what
Re: (Score:2)
Really, you'd just need to put enough series inductance on the D- and D+ lines to foul up any data transfer. That way systems like the iPhone's charge sensing resistor trick would still work.
jailbroken? no need for that (Score:2)
consider what happens when you plug an ipod classic into an usb slot.
or if you got adb enabled on android. or if your android is from a manufacturer which has rather fancy control sw suites on pc. the usb is generally considered a trusted port or indeed more like plugging to a host.
"or simply rebooted" implies that they rebooted when they were attached to usb, which sounds a bit far fetched tbh.. the charging units could host a malicious pc on a chip, sure.
you could fight this by getting an extension cable
Re: (Score:2)
or dropping the maybe US$20 on both a AC and DC to USB module heck i think that US$40 will get you one of those emergency charger things and it will come with one or both included
Re: (Score:3)
"or simply rebooted" implies that they rebooted when they were attached to usb, which sounds a bit far fetched tbh.
Many phones will boot when connected to power if they are off to begin with. I think that's what he meant.
Sounds like an opportunity (Score:1)
Re: (Score:1)
Re: (Score:2)
Just my thought. Easily made from an USB extension cord if you are into DIY. I have one in order to keep my mp3 player preventing my PC from booting when I charge it.
Re:Sounds like an opportunity (too late) (Score:1)
Or buy one of these: https://www.dealextreme.com/p/usb-male-to-female-data-charging-cable-20cm-length-47088 [dealextreme.com]
Re: (Score:2)
Someone doesnt understand how BES server works, or who controls the keys.
Have fun cracking AES256 with a 30 character key.
Re: (Score:2)
was under the impression that those oppressive regimes (Iran wasn't it?) told blackberry all that is a big no-no and that the gov't needs to be able to track everything for blackberry to do business in the country? could be incorrect.
No, youre correct, and what RIM agreed to was to give access to the packets, IIRC. Noone ever made the claim that that would do the Gov't any good if their target used a BES. BIS (thats with an 'I', the non-corporate consumer option that does POP and IMAP and OWA push) users might be out of luck, however.
in any case that's not a problem with Blackberry, they're no less secure than any other phone. more, in fact
That is true, since they natively support full disk and memory encryption, IPSEC VPN, and full AES encryption on all communications, as well as full handset control from the server. iPhone etc might have
Re: (Score:2)
Re: (Score:2)
I don't think that worked.
Seatback charging on airplanes (Score:5, Informative)
Re: (Score:2)
I haven't flown on Air Canada but I imagine that the system on V Australia planes is quite similar. There the USB port can be used for charging, but you can also connect a remote storage device (probably intended for a thumb drive, but a phone in USB storage mode would work the same) in order to playback photos, mp3s and videos (divx I guess) through the seat-back entertainment system.
Re: (Score:1)
there should be no reason those plugs have all 4 pins installed, thats just asking for it
Re:Seatback charging on airplanes (Score:4, Informative)
AC Chargers that can supply up to 1000ma short the two data pins together to tell the phone it can draw that high amount of current.
USB devices connected to a controller are only allowed to draw 500ma, and only after negotiation with the host.
A USB connected to a port where the data pins are not shorted AND cannot negotiate a higher current with the host is only allowed to draw 100ma.
So removing the data pins from a USB port will prolong charge duration 5x or 10x
Re: (Score:3)
Not if you short them together on the device side.
It's not quite that simple (shorting data lines) (Score:2)
Re: (Score:2)
I was surprised and thought the seatback device probably contained a small PC to handle the interactive display.
If it linked to the flight control systems you would have been really surprised...but not for long.
Re: (Score:2)
This would be a major danger with IEEE1394 because it's a route to memory via DMA and only recent platforms have an IOMMU worth its sand. But with USB it's only a danger if your device is very trusting... Of course, a lot of small devices will search for a filename based on their device type in order to perform a flash upgrade...
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
There could be a simpler reason for this... many devices charge MUCH faster if they sense a valid data connection... without the data connection, you're limited to normal USB line level. It's possible that the only thing on the other side is some caps and a resistor.
Re: (Score:3)
I tried to poke around on the host device to see what I could find, but didn't get anywhere with it
If you drill down to something called TCAS or FMS I advise you to leave it alone.
Re: (Score:1)
The ports were originally intended for game controllers to be attached to the entertainment system.
Re: (Score:1)
Jailbreaking? (Score:1)
Re: (Score:1)
While the software shouldn't suck... (Score:2)
Connector suitable to phone/device in question on one side, whatever tricks are needed to convince that class of device that this is an Officially Blessed Charger(usually some resister-based fuckery on the data pins or a simple USB handshake of some sort) and USB cable with only +5 and GND lines
Told you so (Score:4, Informative)
Told you so on February 6, 2009. [slashdot.org]
Back in 2009, it was just a Windows autorun problem. Since then, Google and Apple have been able to screw up in the same way.
Coming soon, I suppose, attacks on appliances via "smart meter" data links. Not everything should have a data link.
Re: (Score:2)
They did NOT steal data... (Score:2)
They were capable of pulling data, but took the ethical route instead, displaying a warning message informing attendees of the dangers of using public charging kiosks.
I think this should be made more clear in /. article.
Re: (Score:1)
Even worse, there was a sign on the actual station that said something like "never plug your phone into an untrusted jack" and yet people were there all weekend plugging their phones into the thing. It's DEFCON, folks, c'mon.
I quit using Fresh Evo over this, (Score:2)
They thought making it's users unable to turn off USB debugging was a positive feature they should all enjoy. Screw that. I'm also a little annoyed Android doesn't support SD encryption, taking the S out of SD.
Re: (Score:2)
I'm also a little annoyed Android doesn't support SD encryption
I think Android 3.x does. You can also buy WhisperCore for earlier devices (not that I'd trust encryption I can't compile myself). I think there was a port of LUKS to Android 2 as well. But only the newest mobil eCPU's (e.g. in the Droid 3) have hardware AES, so it's going to eat battery on older stuff (and most Android phone already have terrible battery life).
When I can get 3 days charge and encryption on an Android phone I'm buying one, fu
i still have a 25 euro samsung cellphone (Score:1)
Re: (Score:2)
I'm glad you're happy with your phone. Mine allows me to do my job wherever I am. Different people have different needs, who knew?
Re: (Score:1)
Dumb question.. (Score:2)
Will turning them *off* first help prevent this from happening?
Re: (Score:2)
Will turning them *off* first help prevent this from happening?
Someone elsewhere in this topic commented that that is what they thought was meant by "rebooted" - i.e. when plugged into a charger, the phone turned itself on if it was off. I don't know if that is the case here, but I have seen an old phone of mine do something similar when it was off and I plugged it in to charge.
Hardware solution? (Score:2)
Does anyone make a cable and/or a tiny Male2Female adapter that passes through only the power pins? With one of those on our keychains we could safely charge our iDevices anywhere without fear of data diddling.