{"id":28470,"date":"2020-12-05T02:27:15","date_gmt":"2020-12-04T15:27:15","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/evil-maid-attack\/28470\/"},"modified":"2020-12-05T02:27:15","modified_gmt":"2020-12-04T15:27:15","slug":"evil-maid-attack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/evil-maid-attack\/28470\/","title":{"rendered":"How to avert an evil-maid attack"},"content":{"rendered":"<p>An <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/evil-maid\/\" target=\"_blank\" rel=\"noopener noreferrer\">evil-maid attack<\/a> is just about the most primitive type of attack there is, but it\u2019s also one of the most unpleasant. Preying on unattended devices, the \u201cevil maid\u201d tries to steal secret information or install spyware or remote access tools to gain access to the corporate network. Here\u2019s how to stay safe from intruder actions.<\/p>\n<h2>Classic example<\/h2>\n<p>In December 2007, a delegation from the US Department of Commerce traveled to Beijing for talks on a joint counterpiracy strategy. On return to the US, however, the commerce secretary\u2019s laptop <a href=\"https:\/\/www.nbcnews.com\/id\/wbna24880526\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contained spyware<\/a> whose installation would have required physical access to the computer. The owner of the laptop said he\u2019d had the device with him at all times during the negotiations, and had left it in his hotel room \u2014 in the safe \u2014 only while dining downstairs.<\/p>\n<p>In theory, a pro can compromise a device in 3 to 4 minutes, but that sort of thing tends to occur when the computer is left unattended and unlocked (or not password-protected). But even with basic security measures in place, an evil-maid attack still has a chance.<\/p>\n<h2>How attackers gain access to information<\/h2>\n<p>Loads of ways exist to get to critical information. They depend on the age of the computer and the security software on it. For example, older machines that do not support Secure Boot are bootable from external drives and therefore are defenseless against evil-maid attacks. Modern PCs tend to come with Secure Boot activated by default.<\/p>\n<p>Communication ports that support fast data exchange or direct interaction with device memory can serve as siphons for extracting personal or corporate secrets. Thunderbolt, for example, achieves its high speed of data transmission through direct access to memory \u2014 which opens the door to evil-maid attacks.<\/p>\n<p>Last spring, computer security expert Bj\u00f6r\u00adn Ruytenberg <a href=\"https:\/\/thunderspy.io\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">shared a way he\u2019d found to hack any Thunderbolt-enabled Windows or Linux device<\/a>, even one locked and with connections by unfamiliar devices through external ports disabled. Ruytenberg\u2019s method, dubbed Thunderspy, assumes physical access to the gadget and involves rewriting the firmware of the controller.<\/p>\n<p>Thunderspy requires the attacker to reprogram the Thunderbolt chip with their version of the firmware. The new firmware disables built-in protection, and the attacker gains full control over the device.<\/p>\n<p>In theory, the Kernel Direct Memory Access Protection policy patches the vulnerability, but not everyone uses it (and those with Windows versions prior to 10 couldn\u2019t). However, Intel announced a solution to the problem: Thunderbolt 4.<\/p>\n<p>Good old USB can also serve as an attack channel. A miniature device, inserted into a USB port, becomes active when the user turns on the computer and execute BadUSB attack.<\/p>\n<p>If the information they\u2019re after is particularly valuable, cybercriminals might even attempt the difficult and costly task of stealing the device and replacing it with a similar one that already contains spyware. Sure, the spoofing will be revealed soon enough, but most likely not until after the victim enters their password. Fortunately, as we said, pulling off that switch is both difficult and expensive.<\/p>\n<h2>How to minimize your risk<\/h2>\n<p>The easiest and most reliable way to guard against evil-maid attacks is to keep your device where only you can access it. Don\u2019t leave it in a hotel room if you can help it, for example. If your employees have to go on business trips with work laptops, however, here are some steps you can take to mitigate the risk:<\/p>\n<ul>\n<li>Deploy temporary laptops with no access to critical corporate systems or work data, and then format the hard drive and reinstall the operating system after each trip;<\/li>\n<li>Require employees to turn off work laptops that must be left unattended;<\/li>\n<li>Encrypt the hard drives of any computers that leave the office building;<\/li>\n<li>Use security solutions that block suspicious outgoing traffic;<\/li>\n<li>Ensure your security solution detects BadUSB attacks (<a href=\"https:\/\/www.kaspersky.com.au\/small-to-medium-business-security?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a> does);<\/li>\n<li>Update all software, especially the operating system, in a timely manner;<\/li>\n<li>Restrict direct access to device memory through FireWire, Thunderbolt, PCI, and PCI Express ports on every device that allows it.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Protect your corporate computer from unauthorized physical access.<\/p>\n","protected":false},"author":2411,"featured_media":28471,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2993,2994],"tags":[312,3378,3379],"class_list":{"0":"post-28470","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-attack","11":"tag-thunderbolt","12":"tag-unauthorized-access"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/evil-maid-attack\/28470\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/evil-maid-attack\/22173\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/evil-maid-attack\/17650\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/evil-maid-attack\/23811\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/evil-maid-attack\/21895\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/evil-maid-attack\/20706\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/evil-maid-attack\/24360\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/evil-maid-attack\/23552\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/evil-maid-attack\/29588\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/evil-maid-attack\/9137\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/evil-maid-attack\/37901\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/evil-maid-attack\/16092\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/evil-maid-attack\/14257\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/evil-maid-attack\/25897\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/evil-maid-attack\/12347\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/evil-maid-attack\/29732\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/evil-maid-attack\/26468\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/evil-maid-attack\/23135\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/evil-maid-attack\/28286\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/attack\/","name":"attack"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2411"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=28470"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/28471"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=28470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=28470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=28470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}