USB-C to get security-focussed authentication program

USB C lead

USB Implementers Forum (USB-IF) has announced the launch of its own USB-C authentication program which provides an added layer of security for host systems before opening themselves up to data or power transfer via USB-C.

The program's features include a standard protocol for authenticating certified USB Type-C chargers, devices, cables and power sources, as well as support for authenticating over either USB data bus or USB Power Delivery communications channels.

It will also support 128-bit cryptographic security among other features, all of which will help reduce the likelihood of criminals exploiting USB connections, according to the non-profit organisation.

"USB-IF is excited to launch the USB Type-C Authentication Program, providing OEMs with the flexibility to implement a security framework that best fits their specific product requirements," said USB-IF President and COO Jeff Ravencraft. "As the USB Type-C ecosystem continues to grow, companies can further provide the security that consumers have come to expect from certified USB devices."

According to USB-IF, it selected DigiCert to manage the PKI and certificate authority services for the USB Type-C Authentication Program. DigiCert is a leading security provider for TLS/SSL, PKI and IoT solutions.

"DigiCert is excited to work with USB-IF and its CA Program Participants from the industry at large to provide the technical expertise and scale needed for the USB Type-C Authentication Program, and we look forward to implementation," said Geoffrey Noakes, vice president of IoT Business Development at DigiCert.

On Wednesday it was revealed that Google's ChromeOS would now provide the option to disable USB ports when the screen is locked to combat the issue of criminals plugging malicious devices into a machine and bypassing login screens.

These physical attacks, known as "Rubber Ducky" attacks, involve inserting a USB drive containing with a malicious payload which then tricks the computer into thinking its a harmless keyboard before unloading malicious code onto the system.

A similar string of attacks also struck select Eastern European banks last month in a cyber heist thought to have earned criminals tens of millions of pounds.

The attacks were carried out using Bash Bunnies, a program loaded onto USB devices such as the Raspberry Pi and then connected to USB sockets in meeting rooms located in the banks' buildings. Criminals were said to have posed as contractors or job applicants to gain physical access to machines before exploiting the network.

Connor Jones
Contributor

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.