
In 2008 an infected flash drive was plugged into a US military laptop in the Middle East and established "a digital beachhead" for a foreign intelligence agency. The United States government, too, has fallen victim to flash drive attacks. Set up a call with us and we'll help identify an approach that makes sense for your unique needs. When it comes to your organization's security, active prevention is the best strategy. The virus targeted industrial control systems made by Siemens, compromised the system's logic controllers, spied on the targeted systems, and provided false feedback to make detection even more difficult, and it all began with a USB stick infection. USB attacks might sound like they'd be limited to personal devices, but the implications can in fact be much bigger.Ī particularly well-known example of a USB drop attack is Stuxnet, a computer worm that infected software at industrial sites in Iran, including a uranium-enrichment plant. These advanced cyber attacks can compromise a network in secret and provide an element of surprise.


It's known as a Zero Day attack because the hacker has acted before the developer has a chance to act to fix the vulnerability. The most advanced attack by USB exploits a hole in computer software the vendor doesn't know about until the attack is discovered. (We teach students a similar method in our Red Team Training!) When plugged into a computer, it injects keystrokes to command the computer to give a hacker remote access to the victim's computer.
:max_bytes(150000):strip_icc()/sandiskSDDDC2-29a2e4822f6d45fc8673d42f53fc22dc.jpg)
Thumb drives are used pretty much everywhere nowadays.
