FTDI admits to bricking innocent users' chips in silent update

In a move that has surprised and angered security researchers, chip maker FTDI has admitted to issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips. UPDATED.

FTDI bricked Windows update

Hardware hackers and security researchers are furious at chip maker FTDI for issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips.

FTDI used a recent Windows update to deliver the driver update to brick all cloned FTDI FT232s.

On October 24 Fred Dart, CEO of FTDI posted a response to the backlash over its decision to brick cloned chips, as well as having deleted all tweets it had made in response to people on Twitter dating October 22. The company referred to the issue as a 'driver problem.'

The post addressed what FTDI singled out as its "genuine customers" -- maintaining its stance that all users of FTDI chips affected by its actions are knowingly using fakes.

Dart said he acknowledged that silently bricking the chips of its users "caused concern amongst our genuine customer base" and that FTDI did not wish to cause distress "to them" -- yet the post holds no apology for FTDI's actions.

FTDI said,

The recently release driver release has now been removed from Windows Update so that on-the-fly updating cannot occur.

The driver is in the process of being updated and will be released next week.

This will still uphold our stance against devices that are not genuine, but do so in a non-invasive way that means that there is no risk of end user’s hardware being directly affected.

Twitter user John Crouchley asked FTDI for a list of approved sellers, but FTDI declined to help him.

The chip is extremely common on a wide variety of devices and there is no way of knowing which devices have cloned chips -- and the tainted supply chain could hit anyone.

FTDI's surprise new driver reprograms the USB PID to 0, killing the chips instantly.

The hardware hackers at Hack A Day first reported that a recent driver update deployed over Windows Update is bricking cloned versions of the very common FTDI FT232 [USB to UART] chip.

In response to increasing anger and criticism from security researchers on Twitter, FTDI admitted using the remote kill switch and is adamant that this move is necessary to fight counterfeiting.

FTDI says it's not targeting users, but shifts the blame to users in a tweet suggesting users may -- somehow -- knowingly be using cloned chips. In a now deleted tweet from October 22, 2014 @FTDIChip wrote, "@mikelectricstuf FTDI is definitely not targeting end users - if you're unsure if ICs are genuine then please don't use the drivers."

Companies and individuals who buy and use the chip have had no reason to suspect -- and often, no way of knowing -- they might be getting chips from a cloned batch.

The FTDI FT232 is one of the most common chips on devices with USB-serial port hardware functions. It's used to add a USB serial port to a device or project.

Hack A Day explained, "The FTDI FT232 chip is found in thousands of electronic baubles, from Arduinos to test equipment, and more than a few bits of consumer electronics. It’s a simple chip, converting USB to a serial port." 

The company's evident overreach has created a situation that leaders in the security communities consider unethical and untenable -- it will no doubt damage the company's reputation, and possibly its bottom line.

Updated October 25 to reflect FTDI's response post.

Updated October 27 with a link to FTDI's deleted tweets saved here.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All