“Unhackable” USB stick was leaking passwords

Passwords exposed in clear text discovered using packet analyzer

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Claiming your product is “unhackable” is a sure fire way to attract the attention of security researchers aiming to prove you wrong which is exactly what happened recently to the eyeDisk USB drive.

In itsKickstarter campaign, eyeDisk claimed to be an “unhackable” USB flash drive that keeps “your digital data locked and secure, granting access to only you” through the use of iris recognition technology and AES-256 encryption.

The company offered more details on how its USB drive is able to fend off hacking attempts on its Kickstarter page, saying:

“We developed our own iris recognition algorithm so that no one can hack your USB drive even they have your iris pattern. Your personal iris data used for identification will never be retrieved or duplicated even if your USB is lost.”

Hacking the unhackable

Hacking the unhackable

According toPen Test Partnersresearcher David Lodge, eyeDisk’s “unhackable” claims fall short as he was able to bypass the device’s security measures fairly quickly after obtaining one for himself.

Lodge began his tests on the device by plugging it into a Windows VM where the USB drive appeared as a USB camera, a read-only flash volume and a removable media volume.

First he tested the eyeDisk’s iris scanner to see if it could be used to consistently unlock the device and this feature worked as advertised roughly two out of three times. Then Lodge tried to fool the device by using a picture of his child (who has a similar iris scan) to unlock it and once again, the device performed as intended.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

However, when the researcher began to examine eyeDisk’s software and hardware setup, the real problems emerged since the device is essentially “a USB stick with a hub and camera attached.” The contents stored on the eyeDisk drive are unlocked when the authenticator element passes a password along to the controlling software.

Lodge used the open-source packet analyzer,Wiresharkto see if he could sniff out the USB packets being sent from the device. It was then when he realized that the “unhackable” device unlocks by sending these passwords in clear text. This means that its possible to obtain the password/hash in clear text simply by sniffing the USB traffic sent from the eyeDisk.

Pen Test Partners reached out to the eyeDisk team and the firm provided the full details of the security problems discovered to the manufacturer who says they’re working on a fix for the problem. However, the real lesson here is that using the term “unhackable” is just an open invitation to hackers that businesses would be best to avoid using in the future.

ViaZDNet

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.

Washington state court systems taken offline following cyberattack

Is it still worth using Proton VPN Free?

One more AMD eGPU docking station goes on sale — but it doesn’t have USB 4.0, can’t accommodate an M.2 SSD and requires an OCuLink connector to feed the RX 7600M XT chip