So this is just a question that popped into my mind the other day, sorry if it doesn’t fit the community.

At the local pharmacy I noticed two USB ports on the back of the monitors they were using and I was thinking I could’ve easily gotten a RAT in there if I was more smart and malicious.

Similar places were banks or shops, sometimes ethernet ports as well.

Realistically, how dangerous is this? Thanks for any answers.

  • traceur402@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    7
    ·
    24 days ago

    It really depends on the device. usb exploits are generally located in the implementation details and each vendor has their own implementation(s)

    • Herbal Gamer@sh.itjust.worksOP
      link
      fedilink
      arrow-up
      4
      ·
      24 days ago

      Ok but this is a local place people visit a lot so the device is easily identifiable. They could then possibly tailor their device to do something bad right?

  • ChaosMonkey@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    6
    ·
    24 days ago

    Probably just as dangerous as physical access to the keyboard and mouse for HID attacks. Mitigation against this attack is possible by whitelisting ports and/or manufacturer and device IDs (however, device IDs can be spoofed to match).

  • moody@lemmings.world
    link
    fedilink
    arrow-up
    5
    ·
    24 days ago

    An exposed USB port is potential attack vector, but that could be mitigated in many ways. It could be through the OS via policies or other security measures, or it could be disconnected within the device itself, for example.

  • Blue_Morpho@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    24 days ago

    If it’s not an all in one PC, those USB ports on the back of the monitor aren’t likely to be connected to anything.

    I’ve never used the monitor USB ports because they require another USB cable to go back to the PC so the monitor can act as a hub. So it’s not saving much clutter and isn’t easily accessible like a desktop USB hub.

    Furthermore, if the IT department has any security, it will have USB completely disabled. My wife worked in HR for a regular consumer brand and even those laptops were so locked down such that you couldn’t plug in a different mouse without IT approval. You couldn’t even boot to Linux to bypass because the bios was locked and the drive was Bitlockered.

    • Agent641@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      24 days ago

      Can a locked BIOS still be bypassed by shorting the CMOS battery or am I antiquated? It’s been forever since I needed to do that.

      • sylver_dragon@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        24 days ago

        It depends on the system. Some enterprise systems have a BIOS which will survive a loss of battery power and don’t have a hardware reset process. Some Dell laptops were like this and you needed to contact Dell to do a BIOS reset. It’s been long enough that I have forgotten how that worked, but I’d assume it’s some sort of public/private key signing setup.

  • Rob T Firefly@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    24 days ago

    Worth considering that a pharmacy will have cameras all over, so anyone screwing with USBs on their computer will likely be easily caught. It’s a pretty high-risk act with comparatively low chance of reward.