47_Ronin said:
Destroy the HDD? That's drastic. Haven't they tried to plug off/plug in first?
On a more serious note: Linux everybody? I know it's stupid, but the psychological effect on my safety since I installed cinnamon on my old laptop has been massive.
Enjoy your false sense of security. Linux security is basicly security through
obscurity which really isn't security at all, just a reflection of the fact that the majority of people writing dubious code can't be bothered to target you.
Anyway, I'm surprised it's possible to get at the firmware of a hard drive. Not unless you have access to the manufacturing facilities.
I've researched data recovery a little (pretty hard to do, because the people that know anything about it are very secretive), and as far as I can tell, you typically can't just access the firmware of a hard drive directly.
With at least some models to mess with it at all you have to connect through a data bus seperate from the primary data bus which doesn't usually have anything connected to it while the drive is in regular use.
That said, this special interface can do very low level alterations to the drive logic, but... Still...
The USB hack scares me more though. That was demonstrated as a working model by 'white hat' hackers, but even so, it's existence is truly terrifying.
Similar to this issue, they demonstrated that's it's possible to infect the USB plug and play firmware. Once a usb device of any kind is infected, it automatically infects the firmware of any computer it's plugged into through the plug and play code that is essential to the core functioning of USB.
An infected computer then rewrites the firmware of every USB device connected to it, and so on...
And you can't do anything about this, because although you could 'fix' the firmware on infected computers, the nature of the exploit means you cannot prevent re-infection. There is no way of rewriting the firmware in a way that would prevent this issue, because it would cripple a basic function of USB...
Leaving all USB devices permanently vulnerable to this exploit...
No examples in the wild, but...
Anyway, security flaws can be pretty scary if you think about them...