Two independent security researchers release code that replicates some of what they demonstrated at Black Hat. The BadUSB research emerged during this year s Black Hat conference. The researchers say they are taking advantage of weaknesses in the manner in which USBs are supposed to behave. The attack exploits the trust users have in USB devices and their willingness to plug anything into an endpoint. To truly fix the problem, it has to be fixed on the host, not the manufacturers, the researchers say. Code-signing is one approach to take now, they say.
Source: https://threatpost.com/badusb-attack-code-publicly-disclosed/108663/

