129

Suppose I found a USB memory stick lying around, and wanted to examine its contents in an attempt to locate its rightful owner. Considering that USB sticks might actually be something altogether more malicious than a mass storage device, is there any way I can do so safely? Is an electrical-isolation "condom" possible? Is there a way to manually load USB drivers in Linux / Windows / OS X so as to ensure that it won't treat the device as anything other than USB mass storage?

After all, despite all the fear-mongering, it's still overwhelmingly more likely that what appears to be a misplaced memory stick actually is just a memory stick.

Follow-up question: what measures do/can photo-printing kiosks take to guard against these kinds of attacks?

200_success
  • 2,144
  • 2
  • 15
  • 20
  • 38
    Plug it in an old laptop (not connected to a network) that you don't mind burning. – Matty Oct 19 '15 at 08:51
  • 14
    The only really safe way is to take it apart, desolder the flash chip, and read it out with your own trusted circuit. – PlasmaHH Oct 19 '15 at 09:02
  • Besides any kind of software attack you can protect your PC mechanically/electrically by using a cheap USB hub I guess. – ASA Oct 19 '15 at 09:18
  • 1
    From the answers seems there are hardware and software attacks. The first type can be controlled specific USB hubs which isolate power. The second seems harder as they can hidden at firmware and ending up undetected. – Gustavo Rodrigues Oct 19 '15 at 12:32
  • 2
    @PlasmaHH: and then give it back to its rightful owner. He'll probably be happy, yeah! – Thomas Weller Oct 19 '15 at 12:33
  • 38
    Who knows it's not a bomb pretending to be a USB memory stick? And I guess the next version of USB killer may pretend to be a good memory stick for the 5 or so uses. – user23013 Oct 19 '15 at 13:16
  • 9
    `what measures do/can photo-printing kiosks take to guard against these kinds of attacks?` None. They just let themselves get compromised. When I worked for a major A/V vendor, one of our offices was in the same building as a pharmacy, and we ended up having to fire a few employees for continuing to use the photo printer in the pharmacy, because the USB devices they plugged into the photo kiosks would be infected by *dozens* of different pieces of malware, and those would get onto our internal network when they plugged the USB device into their work machines. – HopelessN00b Oct 19 '15 at 14:36
  • @HopelessN00b Yikes! I imagine the same is true of blood pressure kiosks with connectors for various devices, like the one at my local grocery store. Or pretty much any public kiosk with an exposed USB port. – Martin Oct 19 '15 at 21:12
  • 1
    @user23013 The modern-day Trojan horse which (*nearly*) ended civilization. USB Memory Sticks which are Nuclear Bombs. Luckily, one highly skeptical Information Security employee took it apart and discovered the bomb. Now, all USB devices are untrustworthy and should never be plugged in, even if you got it from the store. Never! – DoubleDouble Oct 19 '15 at 21:51
  • Raspberry pies were perfect for that kind of exam until they became popular enough to be targeted. – Dmitry Grigoryev Oct 20 '15 at 08:30
  • 1
    @HopelessN00b Geez. I hope they got a couple of warnings first. – Shane Oct 20 '15 at 15:06
  • 2
    @Shane Oh, they got over a year's worth of warnings. And instructions on which networks they *could* plug potentially infected USB devices in. And company issued equipment so they wouldn't need to use the kiosk. Us IT folks were long fed up with cleaning up after and it and screaming for blood long before they got canned... but, eventually, one of the infections inconvenienced or embarrassed one of our C-levels, and that was that. – HopelessN00b Oct 20 '15 at 15:10
  • 2
    @200_success +1 arbitrary internet point for making me lol, not one upvote :P – Aequitas Oct 21 '15 at 03:35
  • 14
    @Aequitas Many, many years ago I encountered some 3.5 floppy disks that came in individual plastic bags for some reason. I just about had someone convinced they were condoms for virus protection. – Loren Pechtel Oct 21 '15 at 03:50
  • 2
    This is not an answer; just an observation. Assuming the hardware is safe, all the stick contains is 0's and 1's. It is the fault of the PC that it will execute that data. Any port should be programmable to a safe mode where any input is rendered non-executable. –  Oct 21 '15 at 21:58
  • how about using software like deep-freeze? in my case it works like charm :) – Abie Giordano Oct 22 '15 at 10:25
  • Not sure this justitifes a full question being asked (and god knows which stackexchange would be appropriate) but do BIOS's need write access for normal use? Could you physically disconnect the write pin, or add a hardware write blocker inline (if they are now serial) for this sort of thing - assuming other measures are taken too of course? – user2867314 Oct 22 '15 at 16:21
  • 2
    Related: [How can USB sticks be dangerous?](https://security.stackexchange.com/q/102873/34757),  [How do I safely investigate a USB stick found in the parking lot at work?](https://superuser.com/q/1206321/150988),  [Safely opening a suspect USB Drive](https://superuser.com/q/167878/150988),  [How can I browse an untrusted USB flash drive safely?](https://superuser.com/q/983709/150988),  [What is the danger of inserting and browsing an untrusted USB drive?](https://superuser.com/q/709275/150988),  [How can a flash drive spread a virus?](https://superuser.com/q/93939/150988),  and probably more. – Scott - Слава Україні May 06 '17 at 22:07

11 Answers11

79

I'd use a Raspberry Pi, the Model A/A+ without a network connection, as:

  • It (or rather Linux) can read most types of filesystem on a USB stick.
  • The only non-volatile storage it has is an SD card, which can be reformatted (or discarded if you're paranoid) afterwards.
  • If the USB stick turns out to be electrically malicious, you've only lost $20 of hardware.
  • It runs a somewhat non-mainstream OS on a non-x86 platform, which makes it less likely to be vulnerable to typical Windows malware.

This still leaves the question of what you'd do with any files you find on it - copying them to any other machine would obviously put that machine at risk.

Nothing is 100% safe, mind you. I can put it no better than James Mickens: "If your adversary is the Mossad, YOU’RE GONNA DIE AND THERE’S NOTHING THAT YOU CAN DO ABOUT IT".

Ian H
  • 891
  • 1
  • 6
  • 2
  • 4
    The problem is that you might detect nothing (depends of course of ones skills) suspicious on it but it would still carry a dangerous payload. – Vladislavs Dovgalecs Oct 20 '15 at 23:01
  • 2
    A Raspberry Pi, huh? Now I wonder when someone finds a way to infect HDMI controllers. – Rhymoid Oct 21 '15 at 19:40
  • 5
    @xeon: If the policy for found USB devices is to examine them for any obvious signs of ownership and, if any are found, contact the apparent owner (who should then have some clue as to whether the drive is his, and how paranoid he wants to be about the possibility of its having been tampered with) then the entity finding the drive and searching for signs of ownership wouldn't have any reason to care about a hidden dangerous payload since the entity which found the drive would have nothing to fear from such a payload since they'd never expose anything of major value to the drive in question. – supercat Oct 21 '15 at 21:56
  • 1
    +1 This is a much cheaper solution than an opto-isolated usb hub. The cheapest of those I could find were closer to $100. – Ajedi32 Oct 22 '15 at 13:17
  • Did you just call Linux "non-mainstream"? Because that is only true for the desktop market, everything else is dominated by Linux or some other Unix. (Well, except real time stuff, that's mostly VxWorks, which is, as far as I know, not Unix.) – Bobby Oct 24 '15 at 09:49
  • @Bobby is the Linux OS that runs on PRI a mainstream version of Linux? – schroeder Oct 24 '15 at 23:59
  • @Bobby That's right. Linux dominates in markets where plugging in a random USB drive is unlikely, and it doesn't in the markets where plugging in said USB device is more likely. So the point stands. – jpmc26 Dec 12 '15 at 07:38
  • @schroeder The recommended OS for Raspberry Pi is Raspbian, a Debian derivative. There are others, but they look to also be slightly modified versions of the original for the most part. See [here](https://www.raspberrypi.org/downloads/). – jpmc26 Dec 12 '15 at 07:39
  • You might try plugging it into something like a [CIRCLean USB Sanitizer](https://www.circl.lu/projects/CIRCLean/) first, then plug the copied drive into a Linux Live Boot machine with NO network connection whatsoever. You also need to look out for a [BadUSB](https://youtu.be/nuruzFqMgIw) scenario where the actual USB Controller chip itself has been hacked. That's why you copy any data you want to a known good device first, then toss the original. Then an ONLY then would I even consider taking the risk of plugging the copied drive into a machine I actually use. Even then, probably not. – Chiramisu Feb 02 '20 at 10:49
50

The USB-killer wouldn't kill your PC if you connected it through an opto-isolated hub. They do exist, (search: "opto-isolated usb hub") but as I've never used one myself I'm not going to recommend a specific model. They're not cheap though. Here is an example:

usb hub

Once you've dealt with the hardware aspect, you're then reduced to a more common problem. You've probably got more expert advice in other answers already, but my take is to unplug the hard drive (and all other writable storage) of a PC and boot it off a live CD or live USB stick (one which doesn't auto-run the contents of USB sticks of course). That's because it's maximum return for the effort given where I'm starting from. It would be sensible if you were going to make a habit of this to set even your live CD up to not auto-mount and not auto-install hardware, and to unplug the machine from the network. Booting with the suspect stick in place would also be a bad idea, in case it's bootable, but also because you may want to have access to event logs when you've just plugged it in.

Pharap
  • 138
  • 1
  • 8
Chris H
  • 4,185
  • 1
  • 16
  • 22
  • 29
    That's not going to help protect you against a [BIOS virus](https://en.wikipedia.org/wiki/BIOS#Security), or firmware attacks on any hardware you leave connected to your machine. Maybe even your [keyboard or mouse](http://security.stackexchange.com/q/100743/17049). – Jon Bentley Oct 19 '15 at 12:27
  • 1
    @JonBentley, not autorunning or trying to boot off the memory stick should protect the BIOS shouldn't it? Assuming a malicious reflashing is the vector, of course. I've seen the mouse thread and a recent "keyboard masquerading as USB stick" one too. I'll generalise my "disconnect the HDD" to disconnect writable storage. I wonder if it's possible to have a keyboard-macro write and execute a script that could flash the BIOS. – Chris H Oct 19 '15 at 12:40
  • 3
    Note that for fast usb2 or usb3 speed there exist no affordable opto isolators on the market – PlasmaHH Oct 19 '15 at 13:31
  • @PlasmaHH, I'm not surprised, but back-compatibility would be good enough to allow investigation. If the *hardware* is benign, lising the files on the drive might be the next step, then perhaps displaying the contents of them, starting with small text files. – Chris H Oct 19 '15 at 14:03
  • @ChrisH: It can just take a while to download 3TB of data over 12MBit when you want to draw an image for forensics ... – PlasmaHH Oct 19 '15 at 14:07
  • 6
    @PlasmaHH, I'm sure it can. But: (i) 3TB USB sticks aren't exactly common; (ii) the premise of the question wasn't forensics, but: "is this a real USB stick and if so whose" (e.g. non-security IT pro is handed a foudn device -- my interpretation). If it isn't a USB stick, kill it with fire, investigate for fun, or pass to an appropriate authority for forensics. If it's an obviously malicious USB stick take similar action. At this stage we don't need to image it (and you might not want to take posession of the contents unless working on it in a professional capacity). – Chris H Oct 19 '15 at 14:24
  • @PlasmaHH continuing what Chris said, normal sized USB sticks can be imaged in a reasonable amount of time over a 1.0 connection. Roughly half a day for a full 64GB stick (let it run overnight, look at it the next day), or an hour and a half for 8gb. – Dan Is Fiddling By Firelight Oct 19 '15 at 19:31
  • 3
    Given the price of buying an opto-isolated USB hub, I think you're much better off buying a cheap second hand pc online like @Matty suggested - then you need not worry about software, either. – Sanchises Oct 20 '15 at 09:46
  • 2
    @PlasmaHH The biggest commercially available USB Flash drive is 1 TB and costs over 650 USD. A 3 TB USB in the current period means one of 3 things. In decreasing order of likelyhood to end up in your parking lot: 1. the USB device is bugged and overreporting its capacity, in which case don't trust it; 2. It's a prototype from Kingston or Patriot (the only ones that currently sell 1 TB USB drives) and should be returned to them; 3. The device somehow got here from the future and it's possible that current USB standards don't allow you to read it. – Nzall Oct 20 '15 at 21:57
  • You're not kidding about the price tag! I've had many hassles over the years with USB hubs feeding voltage back onto the motherboard so I looked them up upon reading your post. – Loren Pechtel Oct 21 '15 at 03:54
  • @NateKerkhofs, you're spot on but PlasmaHH could be referring to USB external hard drives, which could easily be made into USB killers. Still, you'd only need USB 1.0 to check for that. – Chris H Oct 21 '15 at 06:15
  • @ChrisH You could turn a external HDD into a USB killer, but it would be much more cost-efficient to use something like an 8 GB USB (which you can get for a fraction of the cost of a 3 TB external HDD) or even build a device from scratch. It's also more likely that a USB drive is "accidentally" dropped (say, out a pocket) on a parking lot, especially if the idea is that the thing should still work. – Nzall Oct 21 '15 at 09:37
  • @NateKerkhofs, I agree completely. – Chris H Oct 21 '15 at 10:26
36

If we assume that the stick could have been physically altered for maximum nastiness, then one must take into account the possibility that the alleged "memory stick" will spew out some anthrax spores or a cloud of plutonium oxide when inserted in a computer, so the answer to your question would be: there is no safe way to examine the contents of a memory stick (unless you can delegate the task to some underling who will do it in another building).


Conversely, if we suppose that the attacker will not be that thorough, then we are implicitly using a "threshold of nastiness" which is arbitrary in nature. If we rule out raw physical destructive effects (including trying to fry the host computer electronics), then there are mostly five ways by which an evil memory stick could harm the machine in which it is inserted:

  • The memory stick could try to abuse a vulnerability in the USB controller hardware. That controller is a chip with its own firmware, that is also connected to the main data lanes in the computer, so there exists the theoretical possibility of exploitable holes. This would be very specific to a version of the controller and its firmware, and I am not aware of any such hole in the wild.

  • The memory stick could try to abuse a vulnerability in the operating system code that handles the USB dialogue. This is basically what the PlayStation Jailbreak was doing: the device was, at the USB level, several devices, one of which sending slightly out-of-spec messages that triggered a buffer overflow in the OS code that detects and enumerates USB devices.

  • The memory stick may be, in fact, not a memory stick, but another kind of device, possibly several of them simultaneously. E.g., the stick could be, from the OS point of view, a keyboard, and when inserting it, it could begin to type things. This happens in the wild.

  • The memory stick could be a real memory stick, with a filesystem that exploits a vulnerability in the OS code for filesystems. Apart from direct buffer overflows, there can also be issues with, for instance, auto-run features (it is noteworthy that a number of existing, non-malicious memory sticks also emulate a virtual CD-ROM drive precisely so as to try to exercise such auto-running). A variant would be a stick containing pictures that exploit holes in picture-rendering libraries (that would get invoked by the host computer when trying to show "thumbnails" upon graphically exploring the directories and files).

  • Last but not least, a human operator is involved, which opens lots of attack possibilities. Many attacks simply leverage the bottomless well of human gullibility. The stick contents could induce the human operator to carelessly launch what looks like a harmless executable. Or, even worse down that line, the stick could contain documents of a disturbing nature (some things cannot just be unseen), which still counts as "damage".

Your best bet for "safe exploration" of the stick would be to use a basic PC with an operating system with a good repute with regards to code quality, up-to-date with security patches, and, crucially, with as little plug-and-play support as possible. Ideally, an OS that will not try to do anything automatically with the newly inserted USB device (i.e. an OS which is exactly what modern OS like Windows, OS X or Linux are not). I suggest starting with OpenBSD or NetBSD, customized to deactivate any form of USB-related magic. Using uncommon software and uncommon hardware also offers some small extra protection, on the basis that low-grade, large-spread attackers tend not to bother writing exploits for, say, NetBSD systems running on old PowerPC-based Mac.

Tom Leek
  • 168,808
  • 28
  • 337
  • 475
19

In all cases, keep in mind that there is no perfectly sandboxed system (hardware/electrical, software) that can prevent you from such possible infections for 100%.

On the other hand, your situation can depend on who you are and where you found it.

If you are a qualified worker, let's say, for a car company and you found the stick next to your workplace or next to your living place (you are targeted) then may be the the best thing you could do is to destroy that USB stick because the problem is that there is no way you can know in advance if the USB stick you found has firmware-embedded malware in which case nothing seems useful ('BadUSB' malware lives in USB firmware to remain undetected, unfixable). Such malware could lead to the infection of your BIOS which thing may be too difficult to get rid off (if not impossible).

If you're a Mr. X or Y and you found the USB stick in a random public place, then may be even if the USK stick is infected (by purpose or not) , the malware could not be that dramatic and in which case may be booting to your computer using a Linux Live-CD to boot and check the content of your USB may be a reasonable action.

14

One interesting approach to this problem is CIRClean, also described in a LWN article.

It utilises a Raspberry Pi (presumably fairly expendable in the face of overvoltage and other electrical attacks) into which the untrusted USB mass-storage and a trusted, blank USB mass-storage should be plugged in. And no other devices are plugged in - it's not connected to any network, or keyboard/mouse/monitor. And there's no writable permanent storage, or BIOS to be infected (and the truly paranoid can re-flash the boot SD card before each use if they desire, I suppose).

Power it up, and it will transfer files from one to the other, performing some automated scrubbing of known malware vectors (e.g. transforming PDF or MSOffice files to safer HTML). A visual and audible indicator shows when the process is complete, and the system can be powered down, leaving the user with a somewhat sanitised version of the original filesystem on the trusted storage, ready for transfer into the user's workstation.

If you plan to use CIRClean, I recommend checking its issue tracker for current defects - the LWN article notes (December 2014) that there was no protection against BadUSB keyboard attacks; I haven't determined whether that is still true. Looking at the kernel config file in the Git repository, it certainly looks like it could be locked down much more (Magic Sysrq, anyone?). Perhaps a project to get involved in, rather than (yet) a finished product.

Toby Speight
  • 1,214
  • 9
  • 17
11

While above the electrical aspects were covered many are concerned by a malware infecting your BIOS. Well, then plug it into a machine which doesn't have a BIOS and won't run anything on the stick: use a SPARC machine. I see Sunfire V100 machines on eBay for $50-60 in uncertain conditions, less than $200 for so called "seller refurbished". It is possible there were older thus even cheaper ones that had USB I just can't remember any. The V100 definitely has USB ports. I am sure if a three letter agency is aware of you using a SPARC they will be able to do something nasty with a USB stick but it'd be an extremely costly attack since they would need to do original research on how to do it. Here's the official Oracle page on mounting USB sticks under Solaris.

This forum topic talks about adding USB to Ultra 5/10 if you wish to bother with that but I do not see them much cheaper than the Sunfire V100.

chx
  • 615
  • 3
  • 13
  • 1
    You mentioned a good point: *BIOSless* machine. +1 –  Oct 20 '15 at 07:09
  • SPARC systems have a BIOS; they just call it "firmware". But all computers boot on some code in ROM/Flash, and that code, like every single piece of software, may have bugs. Of course, this is not the same code as a BIOS for an x86-based computer, so one may hope that the attacker "won't have thought about SPARC machines". – Tom Leek Oct 21 '15 at 14:42
  • That's quite exactly what I meant, by BIOS I meant PC BIOS and by "won't run anything on the stick" I meant "anything written for an x86 CPU". I even mentioned the possibility of an attack and how unlikely / costly it is someone actually thought of a SPARC. It also shows how awfully anchored in the past I am -- the Raspberry Pi answer is the same train of thought but it's a cheap available device. However, ARM is much more widespread than a SPARC so if we go by the "there is no kill like overkill" school of thought then perhaps SPARC *is* the best choice. – chx Oct 21 '15 at 19:57
8

The OP is referring to an electrical isolation because of the risk due to a USB killer device:

The device reportedly works by drawing power from the USB ports and using a converter until negative voltage is achieved. The power is then directed back into the computer, with the process looping until the machine's circuitry fries.

Unfortunately there's no way to defend yourself from this attack because it involves the electrical circuitry (unless you build your own customized USB ports!), but it seems very unlikely.

The most common vector of attack nowadays is a Windows virus auto-run when you insert the USB drive. Therefore I'd say that examining the content of a USB drive on a Linux machine is relatively safe. It's unsafe in theory, but in reality you won't risk much doing this, unless someone is targeting you or your company (there's a difference between a USB drive found on a random street and a USB drive found on the parking lot of your company).

dr_
  • 5,060
  • 4
  • 19
  • 30
  • 4
    [Chris' answer](http://security.stackexchange.com/a/103102/58810) mentions an (optically) isolated USB hub which would presumably protect against this kind of device. – Lilienthal Oct 19 '15 at 18:52
  • 1
    Proper protection circuitry (strong clamping diodes on all wires and current limitation) should be enough too. – Michael Oct 19 '15 at 20:03
  • The description doesn't make sense. http://arstechnica.com/security/2015/10/usb-killer-flash-drive-can-fry-your-computers-innards-in-seconds/ Is better, along with the comments. – JDługosz Oct 22 '15 at 08:15
5

Technically on Linux it's quite easy to stop udev and unload every usb-related kernel module except usb-storage. However, there will be two practical issues:

  1. Your stock kernel may have the hid module build in, so you'll have to recompile the kernel to make it loadable.

  2. Once you unload the hid module, the legit USB keyboards and mice will stop working as well. Find an old PS/2 keyboard, or use a virtual keyboard with touchpad/touchscreen (only works if those are not USB).

Jens Erat
  • 23,446
  • 12
  • 72
  • 96
Dmitry Grigoryev
  • 10,072
  • 1
  • 26
  • 56
4

tl;dr: Doing something radical like using a "burner" PC or device that you will use one time to read the USB stick and then discard is an (almost) completely bulletproof way of seeing what's on the stick. But actually going to such extremes while investigating is overkill and a little silly. Except where it isn't.


Believe it or not, there is a nearly foolproof way to examine such a USB stick. Step-by-step:

  1. Find some super-old, super-cheap, but-still-somehow functioning laptop/netbook on the Internet and buy it. (Any tablet large enough to have a full-sized USB port and with an OS that can use external storage on that USB port works also.)

    • Alternative #1: If, however, you also really care about not potentially infecting the USB stick via plugging it into some previously owned device of unknown security history you could just as well for, say, a $60-$70-ish bottom-of-the-barrel new Windows tablet with a full USB port. (They aren't hard to find on Newegg, Amazon, eBay, etc. and via sites like Dealnews.) Cheapest-of-the-cheap commodity hardware has its place.

    • Alternative #2: If you want to save a little cash and you already have an old, crappy, or old & crappy device you'd be happy sacrifice for the purpose of finding out what's on that USB stick you can certainly go that route instead. However, pretty obviously you'd want to make sure that there would be absolutely, positively no personal (or professional data) left on it of any kind before doing so. With a PC that has a classic hard drive you can very likely accomplish that by wiping it with a boot program that overwrites every bit of space on the disk with random data many times over, and then re-installing whatever OS you want. Probably. On the other hand, if you want to use a device that has solid-state storage....

  2. When the package containing your device arrives, grab it, an appropriate charging cable that you're willing to sacrifice (you'll see why in a minute) and make a trip to a location that has power plugs but either (a) no wireless network availability or (b) at least no wireless networks that you've ever connected to before and in all likelihood will never connect to in the future. (A Panera or Starbucks on the other side of town that's far out of your nomal way works great). Just to cover the hypothetical case where some super-ultra sophisticated NSA-level malware present on the USB stick infects your device and then autonomously starts using its radios to try to breach any Wi-Fi, Bluetooth, etc. networks around it. Paranoia bonus: Also leave all other electronic devices of yours that have any kind of wireless connectivity at home. (Yes, including your smartphone. I know it's hard to be apart, but just this once.)

  3. When you arrive at your location, unbox and plug-in your new device. Wait for it to charge a bit.

  4. Turn on your device, wait for it to boot, and plug-in your suspect USB drive. Have a look at anything that's on it, its file structure, whatever characteristics you like. If you are in a place that does have public wifi, maybe connect and grab some tools from the Internet (if your old piece-of-junk will install & run them) and take a closer look. Do literally nothing else with the device.

  5. When you have satisfied your curiosity, grab your device and your charger, go out to a field somewhere nearby, and give them a nice final sendoff by re-enacting that scene from Officespace. (Alert: Auto-playing YouTube vid, with probably NSFW language. Duh.)

  6. Do whatever you've decided to do with the USB stick & any data on it.

(Okay, if you pride yourself with not being hugely wasteful and/or environmentally irresponsible, instead of destroying your "burned" device/PC in a fun manner you could recycle it, donate it to charity, or sell it for a pittance. If you go either of the latter two routes, should you tell the receiving party exactly why you're getting rid of the device? Well, let's maybe call that a cybermorality question for another day.)

The End.

Well, okay, I'm being a little facetitious. But only somewhat. The fact remains that if we're talking about examining a USB device with (nearly) zero security risk the only real option is to plug it into a system that (a) contains absolutely no sensitive info of yours, (b) you are willing to sacrifice should the USB turn out to be some electrically-malicious item, (c) you will never use again for any purpose that requires putting any kind of trust in its security, and (d) will not physically be able to connect to any networks or other devices to spread any malware infection it might get from the questionable USB drive. (Or to seek out any sensitive info that might reside on those devices and/or networks.)

In other words, a "burner" computer is your best bet. If you really, really, really want to examine the drive with almost* perfect safety/security, that is.

Now, if we're just talking about examining the USB stick with a "very likely good enough, given practical considerations" degree of safety/security, @Chris H's suggestion above is a good one: grab a desktop PC or a laptop machine (that you can actually open/service without professional tools), take out the storage drive/s, boot from a live CD/USB OS flavor you prefer, and plug in the suspicious/intriguing USB stick. Is there still a small chance that the USB could contain sophisticated malware that could execute when you plug the USB stick in and then flash your machine's BIOS/UEFI, or flash other writable firmware contained in things like your video card, your networking card, your USB controllers, etc.? Yes. (Although right now all the stuff besides BIOS/UEFI attacks remain very rare in the wild. And even BIOS or UEFI malware needs to be written specifically for the maker/version implementation used in a targeted machine.) Could the item that appears to be a USB memory stick in actuality be a USB-killer that will electricallyfry your motherboard? Well...theoretically, yes. But the probabilities against either of those things being true--especially the USB-killer one--are strongly in your favor. To paraphrase a good point you made in your question, most of the time a plain old USB stick is just a plain old USB stick.

Unless you, your employer, on another entity you are a part of could be considered a very high value target by some sophisticated attacker out there, that is. Then all bets are off. And in which case, a convoluted safety-above-all-else method like the one above might actually be the only appropriate one.

*Of course, there's no such thing as "perfect" security. But "almost perfect" security is close enough for our purposes here.

mostlyinformed
  • 2,715
  • 16
  • 38
  • 2
    While they're getting harder to find, some computers have no form of non-volatile storage which can be altered without swapping chips or, at minimum, physically changing jumpers, There should be zero risk of "infection" when examining a USB stick with such a computer provided one powers it down afterward, because there would be nothing the stick could possibly infect. – supercat Oct 21 '15 at 22:02
  • It's funny, but I had the same thought. But I just assumed that finding a new (or recent-ish) machine like that today would be more or less impossible for an individual. (Obviously, very-security-conscious large corporations & government agencies have access to channels/suppliers that individuals don't. Or can just pay jaw-dropping prices for custom stuff.) Now I'm curious to take a look at what options might be out there. Off to Google... – mostlyinformed Oct 22 '15 at 07:04
3

The other answers cover flashdrives which are malicious, I'll talk about the USB killer mentioned in your linked answer. (EDIT - they did when I started typing this)

A virtual machine won't help with these, it's still going to get power and attempt to fry whatever it's connected to. As far as I can tell, you have three options:

  1. Open up the drive and see if it looks legit, or if its covered in a load of big capacitors.
  2. Plug it into an old machine or an rPi etc. (something you don't mind getting fried)
  3. Build a USB extension with some decent diodes in it, that have a high reverse voltage.

What you choose to do really depends on where you find the drive and how curious you are. Personally, if I found one outside work and absolutely had to check it, I'd plug it into an rPi. If I found one on the street, It's staying there.

Jay
  • 1,565
  • 1
  • 10
  • 12
  • 4
    You'd probably be best using a zener (plus fuse) circuit: See for example http://electronics.stackexchange.com/questions/59666/protect-dc-circuit-from-too-much-voltage (assuming you wanted to build something, I suggest buying an opto-isolated hub in my answer) – Chris H Oct 19 '15 at 10:35
  • I like this idea, may have to get the soldering iron out one weekend! – Jay Oct 21 '15 at 06:54
  • What about a non-powered usb hub? – JDługosz Oct 22 '15 at 07:43
1

You can make a Virtual Machine to act as a so called "condom". A couple of popular hypervisors include VMware Player and Virtual Box. If you crash your VM, you can just make a new one and try again. You can find ISO files on the web to make them with. Just google up some tutorials if you need a walk through, depending on the hypervisor you go with.

If you have a Linux machine, you can make the disk read-only, and may be easier, depending on what you have. You can do this via diskutil in Terminal.

Depending on the route you take, just comment, and I can go more in depth by editing this answer. Hope this gives you some ideas, and gets you closer to your goal.

Vandal
  • 242
  • 1
  • 10
  • 4
    That won't protect you from something like the [USB killer](http://kukuruku.co/hub/diy/usb-killer) device. – tangrs Oct 19 '15 at 07:06
  • 4
    Ah, I understand. I did not consider this. The only thing I had in mind was software related infections. Thanks @tangrs ! – Vandal Oct 19 '15 at 07:10
  • 6
    It won't guarantee protection from software related infections either. Virtual machines can be ["escaped" out](http://security.stackexchange.com/q/3056/17049) of. A hypervisor is a piece of software, and can contain vulnerabilities just like any other. Making your disk read-only won't protect you from attacks on the OS (e.g. to make the disk writeable again), on your [BIOS](https://en.wikipedia.org/wiki/BIOS#Security) or on other firmware. – Jon Bentley Oct 19 '15 at 12:33
  • Also, there are firmware level attacks that abuses the USB protocol directly and can easily breach any unpatched host OS before you even have a chance to connect the device to the VM. – billc.cn Oct 19 '15 at 13:35
  • @billc.cn: you'd want to pass-through the USB controller for a pair of ports to the guest OS, maybe with VT-d or something. (Hardware support for giving a guest access to a PCIe device). – Peter Cordes Oct 20 '15 at 01:06