我们X光检查了一根可疑的FTDI USB线缆。
We X-Rayed a Suspicious FTDI USB Cable

原始链接: https://eclypsium.com/blog/xray-counterfeit-usb-cable/

Eclypsium 使用工业 X 射线机调查假冒硬件的普遍性,起初关注 FTDI USB 转 UART 电缆。一根可疑且有故障的电缆促使他们与从 DigiKey 购买的经过验证的真品电缆进行比较。 X 射线分析显示出显著差异:真品电缆具有接地铺层、退耦无源元件和强大的应力消除等设计元素——这些都是高质量制造的标志。可疑电缆缺少这些特性,表明生产标准较低或可能存在知识产权被盗的情况。 即使对于专家来说,识别假冒产品也并非总是容易的,但其影响是严重的。除了有故障的电缆之外,关键基础设施(如网络设备或服务器)中的受损硬件可能会引入后门和漏洞,被网络攻击者利用。 Eclypsium 强调了复杂且快速扩张的供应链中日益增长的风险,尤其是在人工智能数据中心对组件的需求不断增加的情况下。他们强调需要以硬件为重点的安全措施,并提供一份白皮书,详细说明供应链安全的重要性。

一篇关于可疑FTDI USB线缆的文章引发了黑客新闻的讨论,凸显了硬件层面供应链攻击日益增长的威胁。最初的帖子链接到详细描述潜在恶意线缆的研究。 评论员随后深入探讨了创建持久恶意软件的方法,甚至可以在操作系统重装后幸存。一位用户详细描述了一个项目,涉及用从Aliexpress采购的、故意存在漏洞的“未熔断”版本的英特尔PCH芯片替换主板,从而直接将恶意软件植入硬件。 其他人建议了替代的、侵入性较小的方案,例如针对网卡的固件、服务器BMC或SSD。一个关键的结论是硬件信任根的重要性,以及像“O.MG Cable”这样工具令人担忧的潜力,它允许进行复杂的红队行动和攻击模拟。人们对可能需要要求线缆结构透明化的监管表示担忧。
相关文章

原文

We recently got an industrial X-Ray machine in the Eclypsium office to use to make the next Doctor Manhattan do serious cybersecurity research. In between X-raying yet-to-be released industrial IT technologies on behalf of giant companies whose names we cannot reveal, we have done some other fun experiments.

Eclypsium researcher preparing to x-ray a suspicious USB cable.

One thing we’ve done with it so far was to x-ray some FTDI USB to UART cables. We had an old cable lying around that seemed a little suspicious and dysfunctional. It worked at slow speeds but it failed when transferring firmware images from a product. These failures drove us to purchase the known good cables from DigiKey, which worked as expected. It is possible that this older cable came from a factory which also produced older generations of authentic FTDI cables, but this particular chip didn’t meet the performance requirements for the FTDI brand. Or maybe it was just a production run based on stolen FTDI IP. Or it is actually completely unrelated to any FTDI IC but has been programmed to claim to be FTDI in software. Unless we could match the silicon exactly to a known supply chain, we can really only speculate.  

In either case, we wanted to see the difference between the suspicious cable and a newer, more obviously “legit” one that cost about $20 from DigiKey. It is not a stretch to assume that a suspicious looking cable is a counterfeit. FTDI has publicly announced issues with counterfeit devices. They have even fought back with drivers which brick counterfeit chips. Some people have even referred to this as vendor sanctioned malware.

Here’s what the two cables look like to the naked eye: 

Take a look at the two x-ray images below and see if you can tell which one is suspicious, and which one is authentic. Then scroll down and we’ll tell you what we see.

Xray of an authentic USB cable.

Before we tell you the answer, here are some clues to look out for in each picture. The authentic cable has the following features visible in the X-Ray image, not shared with the suspicious cable:

  1. Ground pours (reduces impedance and ground loops while improving EMI resistance and thermal dissipation). While there is some debate about the actual value of copper ground pours, they are still used by reputable manufacturers.
  2. Ground stapling
  3. Decoupling passives nearer to the main integrated circuit (IC)
  4. More isolation passives for USB data pins
  5. Thermal pad under IC
  6. Engineered strain relief for wire connections
  7. More solder for mechanical tabs on USB A connector
  8. Smaller/newer silicon process
  9. Better passive alignment

OK, the top image above is the authentic cable. The bottom image is the more questionable one.

Did you get it right? If not, go back and see if you can pinpoint the various clues.

The point is that, even when you know what to look for, spotting a counterfeit isn’t necessarily easy. The consequences for a consumer buying a shady USB cable likely aren’t too bad. But what happens when an enterprise gets counterfeit network gear with a backdoor pre-installed? Or when a major bank receives grey market servers with another company’s data on them? Eclypsium has helped major worldwide organizations discover exactly these types of supply chain issues. 

Supply chain risk is growing rapidly. As AI data center projects capture more and more of the global supply for chips, memory, storage, and other key resources, the secondary market for all of these is heating up. The speed and complexity of these supply chains leaves gaps that cyber adversaries can exploit to introduce vulnerable components and backdoors into tech that makes its way into critical infrastructure.

To learn more, grab our white paper on Why Supply Chain Security Demands Focus on Hardware 

联系我们 contact @ memedata.com