HP admits to selling infected flash-floppy drives
Hybrid devices for ProLiant servers pre-infected with worms, HP says
Computerworld - Hewlett-Packard Co. has been selling USB-based hybrid flash-floppy drives that were pre-infected with malware, the company said last week in a security bulletin.
Dubbed the HP USB Floppy Drive Key, the device is a combination flash drive and compact floppy drive and is designed to work with various models of HP's ProLiant Server line. HP sells two versions of the drive, one with 256MB of flash capacity and the other with 1GB of storage space.
A security analyst at the SANS Institute's Internet Storm Center (ISC) suspects that the infection originated at the factory and was meant to target ProLiant servers. "I think it's naive to assume that these are not targeted attacks," said John Bambenek, who is also a researcher at the University of Illinois.
HP confirmed in an April 3 advisory that both versions of the flash-floppy drive may come with a pair of worms, although the company offered few details. It did not, for instance, say how many of the drives were infected, where in the supply chain the infections occurred or even when they were discovered.
If a compromised drive is plugged into a USB port on any machine on the network, the worms may spread "to any mapped drives on the server," HP's alert said.
Up-to-date antivirus software should detect the malware, but HP didn't specify which of the many available programs would find and then delete the worms. Symantec Corp., for example, has signature definitions in its collection for both pieces of malicious code, which it identifies as "Fakerecy" and "SillyFDC."
HP's recommendations included scanning the devices for infection, but the company did not answer questions about the pre-infected drives.
The problem isn't limited to HP and the flash-floppy drives it sells for its servers. In January, big-box retailer Best Buy Co. admitted it sold digital photo frames during the 2007 holidays that contained malware. Best Buy did not recall the frames.
The ISC's Bambenek put the HP gaffe in context. "We've seen some miscellaneous devices [infected] here and there, but in the last four months, first we saw it with a USB key for Check Point's firewall, and now with servers today," he said. The Check Point Software Technologies USB infection was reported a couple of weeks ago to ISC by an end user and quietly and quickly fixed by the security vendor, Bambenek said.
Bambenek also outlined several steps people can take to ensure that hardware isn't factory-infected, including scanning it for malware, searching the Internet for news or security advisory reports and returning any device that shows signs of infection.
"To be safe, yes, you should scan every piece of hardware," he said. "Certainly with devices distributed by corporations."
Read more about Security in Computerworld's Security Topic Center.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!