Examples include the Rubber Ducky (Opens in a new window) attack. acting like a keyboard and typing certain keystrokes. USB device attacks fall into three major categories, depending on what they do once they’re connected to your device. Devices with reprogrammed internal microcontrollers will look like regular thumb drives, but once plugged in, they'll execute another function, e.g. The two most common are via thumb drive devices and public USB charging ports, a practice known as juice jacking (Opens in a new window). ![]() There are dozens (Opens in a new window) of ways a cyberattacker could use a USB drive to install an exploit on your computer. The same kinds of breaches could be used to infiltrate facilities connected to the power grid, oil production, and other Internet of Things networks. The Stuxnet attack discovered in 2010, for example, famously infected (Opens in a new window) Iranian nuclear development sites. One of the most concerning aspects of USB attacks is their ability to give hackers remote control of a system. Bad USB devices can also be used to damage or destroy a computer by delivering an electrical charge. (Illustration: Oleksandr Hruts/Getty Images)Ī USB attack pretty much does what it says on the tin: it uses a USB-connected device, like a thumb drive or hard drive, to get malicious software into a computer or other USB-connected device, such as a smartphone. How to Set Up Two-Factor Authentication.How to Record the Screen on Your Windows PC or Mac. ![]() ![]()
0 Comments
Leave a Reply. |