El ataque BadPower puede incendiar dispositivos

BadPower can set devices on fire

Chinese experts from Xuanwu Lab (research arm of Tencent) have published a report on the BadPower attack technique, which can set on fire various devices with the use of Quick Charge technology.

In the report, researchers at Xuanwu Lab said that they learned how to change the firmware of fast chargers in such a way as to cause damage to the devices connected to them, including setting them on fire.

“Quick Charge technology appeared a few years ago and devices from many manufacturers support it now. As the name implies, the voltage and current specifications of such chargers have been changed in a special way to speed up the process of charging the battery of a phone, tablet, and so on”, – dice el informe, adapted ZDNet.

Such chargers are equipped with special firmware that “communicates” with the connected device and coordinates the charging speed with it (depending on the capabilities of the gadget). If fast charging is not supported, the charger supplies the gadget’s battery with a standard voltage of 5V, otherwise the fast charger can work with a voltage of 12-20V and even more.

The BadPower technique presented by the experts is based on overriding the default charging parameters in order to apply a significantly higher voltage to the target device, which ultimately can lead to overheating, deformation, melting and even fire of components. The damage from a BadPower attack varies depending on the model of the fast charger, as well as the model and protection of the gadget that is being charged.

BadPower can set devices on fire

De hecho, con el fin de «infect» device wi fast charging, an attacker only needs to connect his system to it, wait a few seconds while the firmware is being changed, and then leave the dangerous charger where the victim will use it.

“With some chargers, this doesn’t even require any special equipment, just a smartphone or laptop is enough”, — say Xuanwu Lab researchers.

Tencent experts tested their attack in practice: they selected 35 fast chargers from 234 models on the market, y encontré que 18 models from 8 different suppliers were vulnerable to BadPower.

The researchers write that most of the problems with fast charging can be fixed by updating the firmware, but not all chargers can in principle be patched. The fact is that experts analyzed 34 papas fritas, on which are based various models of fast chargers. It turned out that 18 of them produce chips without the possibility of subsequent firmware updates, eso es, in many cases manufacturers simply will not be able to distribute updates.

The experts have already notified all vendors about the results of their research, as well as the China National Vulnerability Database (CNVD).

Do you think that such exotic attacks are not really used? Pozo, I recently wrote that hackers exposed the American company to a rare attack via BadUSB.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *