Hewlett-Packard has been selling USB-based hybrid flash-floppy drives that were pre-infected with malware, the company said last week in a security bulletin.
Dubbed "HP USB Floppy Drive Key," the device is a combination flash drive and compact floppy drive, and is designed to work with various models of HP's ProLiant Server line. HP sells two versions of the drive, one with 256MB of flash capacity, the other with 1GB of storage space.
A security analyst with the SANS Institute's Internet Storm Center (ISC) suspects that the infection originated at the factory, and was meant to target ProLiant servers. "I think it's naive to assume that these are not targeted attacks," said John Bambenek, who is also a researcher at the University of Illinois.
Both versions of the flash-floppy drive, confirmed HP in an April 3 advisory, may come with a pair of worms, although the company offered few details. It did not, for instance, say how many of the drives were infected, where in the supply chain the infections occurred or even when they were discovered.
What Happens if You Use One?
If a compromised drive is plugged into a USB port on any machine on the network, the worms may spread "to any mapped drives on the server," HP's alert said.
Up-to-date anti-virus software should detect the malware, but HP didn't specify which of the many available programs would find and then delete the worms. Symantec Corp., for example, has signature definitions in its collection for both pieces of malicious code, which it identifies as "Fakerecy" and "SillyFDC."
HP's recommendations included scanning the devices for infection, but the company did not answer questions about the pre-infected drives.
The problem isn't limited to HP and the flash-floppy drives it sells for its servers. In January, big-box retailer Best Buy Co. admitted it sold digital photo frames during the 2007 holidays that contained malware. Best Buy did not recall the frames.
The ISC's Bambenek put the HP gaffe in context. "We've seen some miscellaneous devices [infected] here and there, but in the last four months, first we saw it with a USB key for Check Point's firewall, and now with servers today," he said. The Check Point Software Technologies USB infection was reported a couple of weeks ago to ISC by an end user, said Bambenek, and quietly and quickly fixed by the security vendor.
Bambenek also outlined several steps people can take to ensure that hardware isn't factory-infected, including scanning it for malware, searching the Internet for news or security advisory reports, and returning any device that shows signs of infection.
"To be safe, yes, you should scan every piece of hardware," he said. "Certainly with devices distributed by corporations."
This story, "HP Admits to Selling Infected Flash-Floppy Drives" was originally published by Computerworld.