Malicious USBs can allow attackers to obtain a user's passwords, access their devices, and even irreversibly damage their computer.
It's understandable that when people find a misplaced USB drive or memory stick, they want to find out what it contains. Human curiosity is what attackers exploit, after all. However, plugging an unauthenticated device into your own or work computer can be very dangerous, and USB flash drives are still a common way for attackers to infect computers with viruses and malware. They can damage your devices and data in seconds. If you think this can't happen to you, think again!
You can find a malicious flash drive on the street, at school, or at work. The problem with USB security is more complex than ever, and the popularity of related threats has only been amplified through the growing presence of online video tutorials on making these devices and the increased availability of hardware. It's not just flash drives that we’re talking about here – other USB devices can also be infected, including seemingly innocent cables.
In addition to the aforementioned case of “lost” USBs, there are also cases of malicious flash drives that people receive for free as promotional materials at conferences, job fairs, or other events.
How do malicious USB attacks work?
In a nutshell, malicious USB attacks can be broken down into the following steps: First, the attacker uploads malicious code to the USB device, which is executed when connected to a computer or when the user opens an infected file stored on the drive. If the user has antivirus installed on their device, the risk is greatly reduced – this is because an antivirus program can detect the malicious behavior and stop the attack.
The second option is to set the hardware of the USB device so that the computer perceives it as a keyboard or webcam when connected. This makes it easier for an attacker to overcome security measures and infect the user's computer with malware.
The most commonly used type of such malicious device is the so-called Rubber Ducky, which appears to be a regular USB drive but actually mimics a keyboard. When plugged into a computer, it can "press" predetermined keys and execute malicious code. Rubber Ducky also appeared in the second season of Mr. Robot, which portrayed Rami Malek as a young hacker. (If you're thinking about what to tune into tonight, this series is definitely worth a watch!)
What are the dangers of USB flash drives?
A malicious USB device can allow a victim to steal stored passwords, gain access to sensitive files, or directly open a backdoor to gain control of a device. In rare cases, it can even damage the device so badly that it can no longer be used.
Malicious USBs can also be an effective way for cybercriminals to bypass some corporate security measures. They can use them to gain access to a computer, server, or an organization’s network. An attacker usually only needs to wait for an employee to voluntarily plug the device into their work computer.
How to protect yourself from malicious USB devices
- Beware of unauthenticated devices: Only connect your own USB devices to your computer, where you know the contents and purpose. Don't plug a drive into your computer that you found somewhere or are unsure who it belongs to.
- Unplug USB devices automatically: You can specify in your computer's settings which devices can connect to it automatically. We recommend that you disable this option for all devices. This will give you more control over your computer and prevent connected USB devices from automatically running programs.
- Don't run or install anything from someone else's USB: The same applies to any file you find on someone else's USB as it does to those you find on the internet – be careful not to run or install programs.
- Use antivirus: You can prevent some attacks from a malicious USB if you protect your computer with a robust antivirus.
FAQs
A malicious USB device can allow a victim to steal stored passwords, gain access to sensitive files, or directly open a backdoor to gain control of a device.
What is the danger of a malicious flash drive? ›
The problem is these devices act like a remote keyboard when the victim plugs them into their device. The removable media devices have pre-programmed keystrokes that can place malware on your computer, delete important files, open a backdoor for persistent access, and more.
What are the risks of USB sticks? ›
USB storage devices are a convenient way of sharing and transferring data and files, but they also pose a risk to cybersecurity.
- Passing a virus or malware between machines.
- Data falling into the wrong hands simply by losing the device.
- Targeted hacking could be in the form of 'found' USB devices.
What security risks are associated with USB drives? ›
What Are the Security Risks of USB Flash Drives?
- Theft of data.
- Installation of prohibited applications.
- Storage of unlawful data.
- Storage of encrypted data.
- Distribution of viruses.
- Identity theft.
- Running applications covertly.
What are the dangers of plugging in a USB? ›
Hardware Risks: Damage to Your PC Unknown USB devices can also pose risks to your computer's hardware. Malicious devices might deliver harmful electrical currents or cause a short circuit, leading to physical damage to your USB ports, motherboard, or other connected devices.
Can a USB cable be malicious? ›
A malicious cable is any cable (electrical or optical) which performs an unexpected, and unwanted function. The most common malicious capabilities are found in USB cables. Data exfiltration, GPS tracking, and audio eavesdropping are the primary malicious functions.
What are the consequences of USB drive? ›
Malicious Software Installation: Attackers might use USB disks to deliver and execute malicious software or keyloggers on a system, gaining control or access to sensitive information. Data Loss and Theft: USB disks are small and easily misplaced or stolen.
Why can USB flash drives be a threat? ›
Major dangers of USB drives. USB flash drives pose two major challenges to information system security: data leakage owing to their small size and ubiquity and system compromise through infections from computer viruses, malware and spyware.
What are 3 disadvantages of USB? ›
There are a few potential disadvantages to using USB devices:
- They can be lost or stolen- because USB devices are small and portable, they are easy to misplace or have stolen. ...
- They can be damaged- USB devices are vulnerable to physical damage, such as being dropped or having their connectors bent.
Can a USB stick be hacked? ›
People often don't think twice about taking freebies from events and their mailbox and plugging the infected USB devices into their computers. But they should. USB sticks are a common way hackers install ransomware and other types of malware.
SCAN THE DRIVE FOR VIRUSES
The first step in safely opening a USB drive that you don't own is to scan it for viruses. This can be done using a reputable antivirus program, such as Norton or Kaspersky. Make sure to keep your antivirus program up-to-date to ensure that it can detect the latest threats.
What damages a USB drive? ›
Fluctuations in voltage, power surges, or improper usage of the flash drive, such as unplugging it without safely ejecting, can lead to electrical damage. This damage may manifest as corrupted data, unrecognized drives, or complete device failure.
What are the common problems with USB? ›
USB-related issues can be caused due to incompatible device, outdated, incorrect, or corrupt drivers, damaged USB ports or cables, faulty USB port, and so on.
What is the negative of USB? ›
If you were to open up a USB cable, you would notice 4 different USB wire colours: white and green, which carry data, and red and black, which are used for power. Red carries 5 volts and acts as the positive wire, while black is the negative wire, otherwise known as the ground wire.
Can you get a virus from a USB flash drive? ›
An infected USB drive can be a real threat because it can quickly install another version of a self-replicating virus and start sending malicious instructions to the computer. It also has the ability to open backdoors, install keyloggers and ransomware, steal data, and much more.
Can someone hack your computer with a flash drive? ›
People often don't think twice about taking freebies from events and their mailbox and plugging the infected USB devices into their computers. But they should. USB sticks are a common way hackers install ransomware and other types of malware.
What happens when a flash drive gets corrupted? ›
File System Corruption:
A flash drive with a corrupted file system may not be formatted, opened, or scanned by your computer.
How does malware spread through USB? ›
More than 90,000 unique IPs are still infected with a PlugX worm variant that spreads via infected flash drives. Systems associated with more than 90,000 unique IP addresses are still infected with a PlugX worm variant that spreads via infected USB drives, bypassing air gaps, cybersecurity firm Sekoia reports.