From the following article eviscero some sidebars
http://www.achab.it/blog/index.cfm/2014/12/nuovo-malware-per-i-device-usb-come-proteggersi.htm
In essence it is a virus that works at the level of firmware USB devices, which can open backdoor or redirect internet browsing without the AV intercept it and without that the producers have applied any Firmware USB solution.
The malicious code has already been put online on some sites (like GitHub) with the aim to put pressure on manufacturers of USB hardware
It infects injecting the firmware altered within the USB device to hit; so you will have behaviors invisible to all today's computer security mechanisms.
In a test carried out in August 2014, some researchers have gained access to a remote computer by driving it so that effettuasse downloading a program from the Internet simply by modifying the firmware of the keyboard as if the commands arrive from the keyboard itself.
http://www.achab.it/blog/index.cfm/2014/12/nuovo-malware-per-i-device-usb-come-proteggersi.htm
In essence it is a virus that works at the level of firmware USB devices, which can open backdoor or redirect internet browsing without the AV intercept it and without that the producers have applied any Firmware USB solution.
The malicious code has already been put online on some sites (like GitHub) with the aim to put pressure on manufacturers of USB hardware
It infects injecting the firmware altered within the USB device to hit; so you will have behaviors invisible to all today's computer security mechanisms.
In a test carried out in August 2014, some researchers have gained access to a remote computer by driving it so that effettuasse downloading a program from the Internet simply by modifying the firmware of the keyboard as if the commands arrive from the keyboard itself.
If you want to disable USB devices you can follow this article:
If you want to use GPO for this purpose here is an interesting blog article:
Dal seguente articolo eviscero alcuni trafiletti
In sostanza si tratta di un virus che lavora a livello
firmware degli apparati USB, che puo’ aprire backdoor o redirect senza che gli
AV lo intercettino e senza che i produttori si USB abbiano applicato alcuna
soluzione.
il codice malevolo è già stato messo online su alcuni siti (come GitHub) con lo scopo di fare pressione sui costruttori di hardware USB
Si infetta iniettando il firmware alterato all’interno del device USB da colpire; si avranno così comportamenti invisibili a tutti gli odierni meccanismi di protezione dei computer.
In un test effettuato in agosto 2014, alcuni ricercatori hanno ottenuto l’accesso remoto a un computer pilotandolo in modo che effettuasse il download di un programma da internet semplicemente modificando il firmware della tastiera come se i comandi arrivassero dalla tastiera stessa.