Investigating an “evil” RJ45 dongle

What the dongle actually does

  • Discussion agrees the investigated dongle isn’t “evil”; it’s a cheap USB–Ethernet adapter that:
    • Uses a small SPI flash to store configuration and a Windows driver.
    • Presents itself as a virtual CD-ROM to auto-install drivers, a pattern common in older 3G/4G modems and some NICs.
  • The design appears more like messy legacy engineering and cost/parts decisions than a deliberate backdoor.

Security concerns and “evil hardware”

  • Some commenters argue the design “proves” it’s backdoored because:
    • It includes writable storage, can present as USB mass storage, and could emulate HID devices (keyboard/mouse).
    • It could, in theory, be reflashed into something malicious.
  • Others counter:
    • Modern systems don’t auto-execute from new drives by default; booting or executing malware still needs extra conditions.
    • Any USB microcontroller or reprogrammable flash device shares the same theoretical risk.
    • The shipped driver is signed; while that’s not a guarantee, it’s not obviously malicious in this case.
  • There is consensus that truly malicious USB Ethernet devices do exist (e.g., pentest tools, malicious cables), just not this one.

USB Ethernet performance & architecture

  • Strong subthread on USB vs PCIe/Thunderbolt NICs:
    • PCIe-based (Thunderbolt/USB4) adapters can hit line rate with low CPU and latency.
    • Pure USB NICs often have higher CPU usage and more jitter, but modern chipsets (e.g., certain Realtek 1G/2.5G) can still reach rated speeds.
    • Protocol choice matters: CDC-NCM is more efficient than CDC-ECM.
  • Some report poor performance with older/cheap USB dongles; others report solid multi‑Gbps results with good hardware and ports.

Connectors and naming (RJ45 vs 8P8C, etc.)

  • Long tangent on correct terminology:
    • Ethernet “RJ45” jacks are technically unkeyed 8P8C modular connectors; historical RJ45 specs referred to keyed phone connectors.
    • Similar pedantry surfaces for DE9 vs DB9, and distinctions between ribbon cables vs modern FFC/FPC.
  • Several note that “RJ45 dongle” is imprecise; it’s more accurately an Ethernet-over-8P8C adapter.

Xenophobia, media literacy, and claims about China

  • Many criticize the original viral “Chinese spy dongle” framing as:
    • Technically shallow, jumping from anomalies to nation-state backdoor claims.
    • Feeding existing anti‑China sentiment and general xenophobia.
  • Others note:
    • State-level hardware attacks do exist, and absence of evidence isn’t proof of safety.
    • However, defaulting to “something’s fishy” without solid evidence is harmful.
  • Meta‑discussion: good debunking is time‑consuming; sensational claims spread faster, eroding public trust and pushing people toward either total credulity or total cynicism.

Driver delivery via emulated storage

  • Some appreciate devices bundling drivers in onboard “CD-ROM” storage, especially when network is down.
  • Others prefer standards-based NICs that work with built-in OS drivers and see multi‑mode USB gadgets (storage + serial + NIC) as painful to configure, particularly on Linux.
  • One perspective: this mechanism may have been used to bypass enterprise policies that block USB mass storage but not optical drives.

Hardware design quirks and safety

  • Commenters note:
    • The PCB supports either magnetics or simple series capacitors; some versions apparently omit isolation transformers.
    • Lack of magnetics can be dangerous where there are large ground potential differences (e.g., between building ground and incoming cable plant).
  • The SPI flash is optional and can be disabled or reprogrammed; this makes it both a flexible design choice and a potential attack surface.

Other tangents

  • Wired WiFi via coax between antennas is discussed, especially for lab test setups and congested environments.
  • Several reminisce about bad NIC designs (e.g., older Realtek parts) vs more modern, efficient chipsets.
  • Broader observation: many security issues come less from exotic nation-state hardware and more from rushed, poorly designed corporate software and drivers.