202130 Nov

Malicious USB devices: Still a problem


In 2005, the AutoRun feature, which Microsoft intended to automatically launch programs when a USB device was connected to a workstation, created the perfect opportunity for attackers. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran . In 2017 critical infrastructure in the Middle East was targeted by the so called Copperfield malware distributed by a USB drive at a workstation shared by several dozens of employees in a company. More recently the USB Killer attack has been able to damage a machine beyond repair in seconds just by plugging in the malicious drive to the targeted workstation. A Tesla employee was approached by a Russian cyber criminal who offered one million dollars to spread malware within the company’s IT systems using an infected USB drive.

Source: Gdatasoftware