Page 2 of 2

Re: Signalex USB hub possibly containing malware?!

Posted: Tue Jul 23, 2013 11:30 am
by ghans
I guess the keypress insertion issue is still current , but simply
not relevant on the Pi (it does nothing in LXDE AFAIK).
It is still creepy IMHO but can be simply explained as code left
from demo purposes.

ghans

Re: Signalex USB hub possibly containing malware?!

Posted: Tue Jul 23, 2013 5:46 pm
by RPickers
Thanks for the reply. If its fine on the pi I'll give the board modding a go - unfortunately the d+ connection has broken (track peeled off) and I can't find space to break back into the pcb before the track reaches the black dome (don't know the name - sorry!) So I'll pop back to poundland to get another.

Re: Signalex USB hub possibly containing malware?!

Posted: Tue Aug 05, 2014 11:56 am
by AndrewS
Just spotted this thread... wow! :shock:

I also bought one of these poundland USB hubs last year (just to see if something so cheap actually worked!), and it looks identical to the other photos, but appears I got one with the 'regular' firmware, rather than the 'strange keyboard' firmware. It has VID/PID of 0a05:7211 (which is actually listed in http://www.linux-usb.org/usb.ids ) and lsusb -v reports

Code: Select all

Bus 002 Device 005: ID 0a05:7211  
Couldn't open device, some information will be missing
Device Descriptor:
  bLength                18
  bDescriptorType         1
  bcdUSB               2.00
  bDeviceClass            9 Hub
  bDeviceSubClass         0 Unused
  bDeviceProtocol         0 Full speed (or root) hub
  bMaxPacketSize0         8
  idVendor           0x0a05 
  idProduct          0x7211 
  bcdDevice            1.00
  iManufacturer           0 
  iProduct                1 
  iSerial                 0 
  bNumConfigurations      1
  Configuration Descriptor:
    bLength                 9
    bDescriptorType         2
    wTotalLength           25
    bNumInterfaces          1
    bConfigurationValue     1
    iConfiguration          0 
    bmAttributes         0xe0
      Self Powered
      Remote Wakeup
    MaxPower              100mA
    Interface Descriptor:
      bLength                 9
      bDescriptorType         4
      bInterfaceNumber        0
      bAlternateSetting       0
      bNumEndpoints           1
      bInterfaceClass         9 Hub
      bInterfaceSubClass      0 Unused
      bInterfaceProtocol      0 Full speed (or root) hub
      iInterface              0 
      Endpoint Descriptor:
        bLength                 7
        bDescriptorType         5
        bEndpointAddress     0x81  EP 1 IN
        bmAttributes            3
          Transfer Type            Interrupt
          Synch Type               None
          Usage Type               Data
        wMaxPacketSize     0x0001  1x 1 bytes
        bInterval             255
Maybe there's "good batches" and "bad batches" and I was just lucky to get one from the good batch? ;) :?

Re: Signalex USB hub possibly containing malware?!

Posted: Tue Aug 05, 2014 1:10 pm
by Cancelor
It could be a keystroke logger. It could be a character injector. What you can see today might just be the tip of an iceberg.

It might be capable of all sorts of attacks. https://www.youtube.com/watch?v=1nhWV6kRdro

Not to do with USB hubs but here is another example of what is possible. https://www.youtube.com/watch?v=NuX_ElPhWHs

Re: Signalex USB hub possibly containing malware?!

Posted: Wed Oct 22, 2014 7:03 am
by emerson_t1
I bought one of these -6 Monte ago, no browser issue, but the cable broke. I'm looking at them three power slots longingly. But what is the Ec1 and Y1 for?