TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Energizer battery charger contains backdoor

84 点作者 raptrex大约 15 年前

10 条评论

vog大约 15 年前
The real security nightmare here is the requirement to install <i>extra software</i> just to use a <i>plain battery charger</i>.<p>I'm still wondering how many commodity devices come with a "driver CD". In the last 5-10 years I never needed any of them, as the devices were already fully supported on my Debian system. And I'm sure that is the case for MacOS and Windows, too.<p>The only interesting part of such a CD is the online manual, which is hopefully available as PDF and doesn't require any special software to read it.
评论 #1178309 未加载
评论 #1178532 未加载
评论 #1178657 未加载
olalonde大约 15 年前
I really wonder how the backdoor got there in the first place.
评论 #1178630 未加载
评论 #1178429 未加载
评论 #1178074 未加载
评论 #1178201 未加载
sh1mmer大约 15 年前
How does code like that get in a system from a major corporation?<p>Is this an outsourcing/supplier issue, or something related to Energizer's own staff?
评论 #1178062 未加载
评论 #1178886 未加载
评论 #1177948 未加载
motters大约 15 年前
The tale of how this backdoor got into a battery charging product is going to be interesting to hear.
tewks大约 15 年前
This is a fairly important issue seeing as everyone is pushing towards USB-only charging. There are even USB charging ports on airplanes now.<p>Plugging in your device, with the intent of charging, shouldn't implicitly grant the host the right to install software or access files on the guest.<p>The USB protocol doesn't seem properly designed for this use case: I should be able to plug in to charge without having to worry about security holes.
评论 #1177911 未加载
marltod大约 15 年前
I don't understand why you would plug a battery charger into a USB port? How many people don't have an extra power plug, but do have a laptop that they are going to let run for hours to charge their AA batteries.
评论 #1178056 未加载
评论 #1178997 未加载
ShabbyDoo大约 15 年前
The design of the trojan is odd. According to the Symantec analysis, it did a bunch of xor's on request/replies as a sort of obfuscation. Given the available commands all had GUID "magic numbers", only someone who had analyzed the source code could exploit the backdoor. If one did that, he surely would have observed the xor-ing and could easily add it into his trojan client. If the author wanted to be sure that his botnet was not hijacked, he should have made the trojan check signatures of instructions to verify origin.<p>Perhaps the xors were there to obfuscate the data on the wire so the nefariousness of the open port would not be so obvious to net admins? However, given that most companies would not forward 7777 traffic through their firewalls, this trojan was probably targeted toward home users without firewalls. Or, maybe it was designed as an exploit to be used after another means was used to get inside a corporate firewall?<p>Also, given that probably only a few computers out of a million had this trojan installed with 7777 available on the public 'net, how much effort would be required to portscan machines just to identify botnet members? And, was this even a true botnet? The built-in commands seemed to be designed around data harvesting (for identity theft?).<p>This whole design is very strange to me.
Kliment大约 15 年前
Wow. Any ideas on how this got there? I just don't see the motivation there. Rogue addon at the factory? I don't see what use a battery manufacturer would have from a remote backdoor. I thought USB battery chargers were "dumb" devices.
评论 #1177966 未加载
评论 #1178627 未加载
yread大约 15 年前
<i>We were interested in finding out how long this file had been available to the public. The compile time for the file is May 10, 2007</i><p>That's a looong time before anybody found out
raptrex大约 15 年前
Symantec did an analysis on the Trojan: <a href="http://www.symantec.com/connect/fr/blogs/trojan-found-usb-battery-charger-software" rel="nofollow">http://www.symantec.com/connect/fr/blogs/trojan-found-usb-ba...</a>