The Threat on Your Desk: Building an Evil USB-C Dock (2024)

The Threat on Your Desk: Building an Evil USB-C Dock (1)

Lachlan Davidson

Implants Red Teaming BadUSB Tools

Background #

In recent years, laptops have become thinner and all of their I/O ports have started disappearing. However, to solve this, along came dongles and docks.

The Threat on Your Desk: Building an Evil USB-C Dock (2)

Image source - arstechnica # Guidemaster: Picking the right Thunderbolt 3 or USB-C dock for your desk

USB-C docks like these are now seen all over offices, especially in “hot desk” environments, allowing an employee to sit down at any desk, plug in one cable, and immediately have a ready-to-use workstation. They’re also common in “coworking spaces”, where multiple companies and individuals share an office space.

However, I believe an old threat looms in this environment…

Review of USB Attacks #

We’ve all been told the same thing for years don’t plug untrusted USB devices into your computer.

Malicious USB devices can pose a large number of threats, such as:

  • 🪲 Serving malicious files: Malicious USB storage devices may contain malicious files, such as unwanted .exe, tampered documents with exploits, etc.

  • 👨‍💻 HID Emulation: So called “BadUSB”, “Rubber Ducky” or “Bash Bunny” devices may appear innocuous, but when plugged in they can emulate a keyboard and fire off hundreds of pre-programmed keystrokes per second. This can be used to steal data, install backdoors, or perform all sorts of other attacks.

  • ⚡️ USB Killer: This one is a bit more extreme, but malicious USB devices may purposefully damage your computer by zapping the USB bus.

USB-C docks should be seen as no exception. In-fact, I believe they are a much bigger threat than traditional USB attacks, as people have learnt to trust name-brand USB docks, and don’t see them as a threat.

A Fun, Simple Proof-of-Concept #

To prove my point, I decided to create a simple, practical POC using a name brand USB-C dock with a hidden malicious implant.

Before we get to the horrors of my work, I’ll start with a demo:

So what’s happening here? Well, hidden inside the dock is a Raspberry Pi Zero W running P4wn P1 A.L.O.A - a brilliant framework for turning a Pi Zero into “A Little Offensive Appliance”. This can be used for a range of USB attacks, but here I’m specifically using it to inject keystorkes.

This can be abused to perform all sorts of attacks, such as:

  • Stealing data.
  • Installing a reverse shell.
  • Performing malicious actions on the user’s behalf.

Installing the Implant #

It’s not *too* difficult to open these docks, but it takes some work. There is a rubber pad on the bottom stuck down with some adhesive, hiding a series of screws underneath. This makes it easy enough to disassemble, but quite tedious to open and examine. At a quick glance, it also looks unlikely someone could have opened it up and sealed it again.

The Threat on Your Desk: Building an Evil USB-C Dock (3)

The Threat on Your Desk: Building an Evil USB-C Dock (4)

Once disassembled, you can see there’s actually plenty of vertical space to hide malicious components.

The Threat on Your Desk: Building an Evil USB-C Dock (5)

To keep things simple, I decided to just hijack one of the rear USB 2.0 ports by soldering some leads to the back of the connector.

The Threat on Your Desk: Building an Evil USB-C Dock (6)

This can then be simply soldered up to a micro USB cable connected to a Pi Zero.

The Threat on Your Desk: Building an Evil USB-C Dock (7)

To prevent shorts, I also wrapped the Pi in electrical tape. To prevent the Pi from audibly rattling inside the case, I wrapped it several times until it was firmly in-place.

The Threat on Your Desk: Building an Evil USB-C Dock (8)

Can you tell the difference? #

Once re-assembled, it looks identical to the real thing:

The Threat on Your Desk: Building an Evil USB-C Dock (9)

It is not obvious the device has been opened, and the only notable side effects are:

  • The top rear USB port doesn’t work anymore – this could be easily solved either by adding a small internal USB hub or wiring it via the Pi
  • It is slightly heavier I guess?

Additionally, spoofing the USB vendor and product ID of the Pi allows it to appear genuine.

The Threat on Your Desk: Building an Evil USB-C Dock (10)

Realistically, you would have to open the device to determine whether or not it has been tampered with.

Conclusion & Further Ideas #

This fun little project took just a few hours from concept to POC, and clearly shows USB-C docks can be scary. Plugging in a malicious devices in a covert location certainly isn’t anything new, but there is a range of other attack surface here just waiting to be explored, such as:

  • Invisible key-logging: Inserting a malicious device in between a physical USB A port and the dock’s actual bus may allow an attacker to read everything you type, without you knowing. Very dangerous for stealing passwords.

  • Network tapping: Almost all USB-C docks have built-in ethernet ports. This offers a range of attack opportunities, from sniffing network traffic to acting as a persistent remote device.

  • Screen grabbing: Docks usually have HDMI ports, and whilst it would be difficult, it is very possible a malicious device could capture the user’s screen and send images/video back to the attacker. Inline HDMI capture devices already exist, and it wouldn’t be impossible to implant one into a dock like this.

I might explore some of these in future, but for now, keep being vigilant with what you plug in to your devices - especially in shared spaces.

Disclaimer #

The information in this article is provided for research and educational purposes only. Aura Information Security does not accept any liability in any form for any direct or indirect damages resulting from the use of or reliance on the information contained in this article.

The Threat on Your Desk: Building an Evil USB-C Dock (2024)

FAQs

Are docking stations a security risk? ›

If the IP address is the (known) potential drawbridge over the cybersecurity moat, we all need to start paying closer attention. A docking station that opens up a laptop's data, screen, video, audio and keystroke history is most definitely a potential threat.

Can malware be installed on a docking station? ›

Cybersecurity experts warn that bad actors can load malware onto public USB charging stations to maliciously access electronic devices while they are being charged. Malware installed through a corrupted USB port can lock a device or export personal data and passwords directly to the perpetrator.

Can USB hubs contain malware? ›

Not all USB hubs are created equal. Some may have poor quality, faulty design, or hidden malware that can compromise your data or damage your devices.

What is the use of USB-C docking station? ›

What is a USB-C hub, a docking station, and an adapter? A USB-C hub, docking station or adapter is the solution to the problem of how to connect multiple essential or “nice-to-have" devices to your laptop through one cable when you don't have enough or the right types of ports.

Is it bad to leave laptop plugged into docking station? ›

For modern laptops, there is no issue with leaving them connected to the docking station for extended periods. However, for older laptops from the 1990s to the early 2000s, it may be advisable to consider the different battery technologies used in those devices.

What are the risks associated with cross-docking? ›

Risk of Damage

Cross-docking can be risky since products are not stored in between incoming and outgoing trucks. This means that products may be damaged or lost in transit as they are quickly moved from one truck to another.

Can malware spread through USB? ›

An infected USB drive can be a real threat because it can quickly install another version of a self-replicating virus and start sending malicious instructions to the computer. It also has the ability to open backdoors, install keyloggers and ransomware, steal data, and much more.

Can computer docks be tracked? ›

Most docks are a second NIC for the laptop and so have their own MAC address. If you can monitor your your dhcp logs or have MAC logging enabled on your switch you could get an alert.

Can malware travel through HDMI? ›

Can a HDMI have malware? a HDMI is nothing more than a video/audio connection from A-B, so no.

Can a USB-C hub damage a laptop? ›

Potential Risks Associated with Connecting a Usb Hub to Your Laptop. Overheating: When a USB hub is connected to your laptop, it can cause the device to overheat due to the additional stress on its resources. This can lead to permanent damage and even complete system failure if not addressed immediately.

How do you tell if a USB drive has a virus? ›

SCAN THE DRIVE FOR VIRUSES
  1. Insert the USB drive into your computer.
  2. Open Norton and click on “Security”
  3. Click on “Scans” and then “Custom Scan”
  4. Select the USB drive from the list of drives.
  5. Click on “Scan Now”
Feb 14, 2023

Are USB hubs a security risk? ›

Even charging your smartphone in a public place via a USB connection can expose business or personal data to thieves. The bad guys capture the leaking data through their own devices connected to the same USB hub.

Do USB-C docking stations need drivers? ›

The PC may start installing a driver for the peripherals attached through the dock (keyboard, mouse, etc.) during setup, but no driver is required for the dock itself. For Mac OS, docking station users will need to install a driver for the Ethernet port.

Can you use a USB-C hub on a desktop computer? ›

Expand the capabilities of your PC with the Microsoft or Surface USB-C Travel Hub. It's designed for professionals who travel, so this adapter can give you the extra ports and connections you need when you work on-the-go. It works with PCs and Surface devices that have a USB-C port.

Do I need a USB-C dock? ›

If you think your laptop doesn't have enough ports, you want to connect to an external monitor, move files around at high speed, or just wish you had more freedom to get more done with your laptop, then you probably need a USB-C hub or docking station.

What are the disadvantages of docking? ›

Cons of Cross-Docking Services
  • Requires Sufficient Transport Carriers. A cross-dock facility relies heavily on its transport carriers since goods are shipped promptly and not stored. ...
  • Need for Reliable Suppliers. ...
  • Requires In-Depth Planning & Coordination.

What is the most security risk on a computer? ›

Types of Computer Security Threats and How to Avoid Them
  • Computer Viruses. Perhaps the most well-known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. ...
  • Spyware Threats. ...
  • Hackers and Predators. ...
  • Phishing.

Are computer monitors a security risk? ›

Physical security: Since portable touch screen monitors are designed to be easily carried around, there is always a risk of theft or loss. Losing such a device could lead to privacy breaches if it contains confidential data.

What are the three main security risks to network security? ›

In particular, these three common network security threats are perhaps the most dangerous to enterprises:
  • malware.
  • advanced persistent threats.
  • distributed denial-of-service attacks.
Oct 14, 2019

Top Articles
Conversion: What it is and How it Works in Options Trading
United Nations Convention on the Carriage of Goods by Sea (Hamburg, 1978) (the "Hamburg Rules")
Kreme Delite Menu
Craigslist Pets Longview Tx
Devon Lannigan Obituary
Guardians Of The Galaxy Showtimes Near Athol Cinemas 8
Hk Jockey Club Result
The Realcaca Girl Leaked
Tabler Oklahoma
The Many Faces of the Craigslist Killer
Espn Expert Picks Week 2
Remnant Graveyard Elf
Student Rating Of Teaching Umn
Explore Top Free Tattoo Fonts: Style Your Ink Perfectly! 🖌️
Chris Hipkins Fue Juramentado Como El Nuevo Primer Ministro De...
Flights To Frankfort Kentucky
Gdlauncher Downloading Game Files Loop
Soccer Zone Discount Code
Mikayla Campinos Laek: The Rising Star Of Social Media
Jet Ski Rental Conneaut Lake Pa
Sulfur - Element information, properties and uses
zom 100 mangadex - WebNovel
South Bend Weather Underground
Play Tetris Mind Bender
Inbanithi Age
Craigslist Wilkes Barre Pa Pets
Blackboard Login Pjc
1979 Ford F350 For Sale Craigslist
Delta Township Bsa
Bfsfcu Truecar
Weather Underground Durham
Guinness World Record For Longest Imessage
Elanco Rebates.com 2022
Greater Orangeburg
Walter King Tut Johnson Sentenced
No Hard Feelings Showtimes Near Tilton Square Theatre
Hannibal Mo Craigslist Pets
Ursula Creed Datasheet
Sams Gas Price Sanford Fl
Rage Of Harrogath Bugged
Penny Paws San Antonio Photos
2294141287
Headlining Hip Hopper Crossword Clue
Gander Mountain Mastercard Login
Causeway Gomovies
Powah: Automating the Energizing Orb - EnigmaticaModpacks/Enigmatica6 GitHub Wiki
Mawal Gameroom Download
Ics 400 Test Answers 2022
Suzanne Olsen Swift River
Olay Holiday Gift Rebate.com
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 6172

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.