In the age of porous cyber security, the unbelievable can also happen. How many times have you checked a new storage device and found something awry? More often than not the answer will be in capital No. Storage is produced and delivered afresh with no one ever handling the devices. This myth seems to have been broken. There might be one in a millionth chance or even less, but the very fact that it has happened and the exact cause remains unknown is enough of a reason for everyone to check any new hardware/ software, rather than limiting it to only storage devices. The current issue pertains to SSD. Hardware or software can be tampered with,* so necessary precautions need to be taken.*
From where does this story start? As the story goes, a man bought a brand new SSD and started setting it up. What he discovered sent chills down his spine. Hundreds of gigabytes were already there-packed with unexpected files. The revelation had a very catchy headline, “A Man Bought a “New” Hard Drive, but Upon Plugging It In, He Discovered 800 GB of Files Worth Thousands,,,” A regular normal purchase has already turned out to be a digital mystery. Instead of being empty and ready to use, the drive was packed with high-value, professional grade software. The techie had decided to inspect the contents of software before formatting it.
The SSD had expensive music production tools including Konkat and Reaktor. These are industry level programs used by professional composers and sound engineers. The software found on the SSD could be worth thousands of dollars. After posting on Reddit, others confirmed that the files were legitimate and of significant commercial value. Immediately, it turned out to be a hot topic prompting a wave of speculation and debate. Some Reddit users were of the opinion that the device might have been a returned item,* resold without proper data wipe. In electronics, returned items often get back to the shelf without extensive inspections.
Others were much more skeptical. Some were of the opinion that the files could have been intentionally planned as a part of a scam or a malware operation. Another school of thought is that it could be a tactic to lure buyers into running infected software disguised as valuable programs. It is extremely risky in both cases. If the said software is downloaded it could lead to violation of licensing agreements. Worse still, the files could serve as vectors for malware, spyware or hidden backdoors, opening the system to unimaginable risks. As a rule, digital content of unknown origin has to be seen with full suspicion. The buyer now needs to scan and securely wipe all new and questionable devices. A topic that has been reignited is the concerns about quality control in retail electronics.
TILL HOW FAR CAN THE TESTING BE DONE TO MAKE HARDWARE AND SOFTWARE FULLY CYBER SAFE!