You've all heard of thumb drives or USB drives. Thumb drives
are among the most well-known data transmission devices of days. However,
hackers frequently target systems or devices with this kind of device.
In the event of a USB drop assault, the USB drive is
positioned so that it is readily visible to us. As an illustration, consider
this. You are employed for ABC Company. Thus, there are hackers eager to breach
this business. The hackers intentionally left a USB with harmful code on it
because they wanted to hack the ABC firm.
Alright, so you notice this. You realize that this had to be
a USB that someone in your workplace has. As a result, we must identify its
owner. You attach this USB to a company device in order to search for the
owner. That's when the device used by the entire company is compromised.
Let's now examine the potential techniques for a USB drop attack.
Malicious code
Social engineering
Now, what is the connection between USB drop attacks and social engineering? As we previously discussed, this also occurs when a hacker attaches a device that has malicious malware and clicks flies on it. In this instance, clicking on these links takes the user to the phishing website. If a user provides login credentials, he will be hacked even if it is not possible.
HID (Human Interface Device) spoofing
It is accurate to state that another way to attack a USB device is through HID, or Human Interface Device. In this instance, it is accurate if the hacker's USB recognizes our gadget as a keyboard.
The hacker's USB appears to be a standard USB, but it is actually configured to function as a keypad. The hacker can then take full control of the user's device once they connect this.Such USB drop assaults are also known as zero-day attacks.
due to the fact that the hacker strikes before the developer can address this
vulnerability.
USB Rubber Ducky
Another well-known USB hacking tool is known as USB Rubber
Ducky. The Hack5 group is the maker of USB Rubber Ducky. We didn't believe he
could hack this device when we first saw it. Because anyone looking at it will
assume it's just a regular USB pen.
However, he is more
complex than we realize. He's got a lot of hacking power. There is a minor chip
within this Rubber Ducky. The chip in this Rubber Ducky can be programmed to be
hacked with the right commands, allowing someone to hack certain data.
Now let's see what Security Breaches have happened due to USB
- Stuxnet is the name of an attack that occurred in 2010. The purpose of this strike was to halt investigations into Iranian nuclear facilities. Almost 200,000 devices have been infected as a result of this attack. Additionally, there have been about 1,000 physical gadget damages. (more details..)
- Furthermore, in 2008, a flash drive connected to a US military laptop in the Middle East established "a digital beachhead," a foreign intelligence organization. (more details)
- Trustwave is an organization that needs to be included when discussing USB assaults. They have investigated USB-based attacks. In this instance, they left five USB devices bearing the company's branding after targeting a specific business. Subsequently, three of the five USB drives were taken by the employees of the relevant company and linked. Trustwave has examined this company's physical security implementation as a result. (more details)
Let's see what we can do to protect ourselves from USB attack
- If you are a company owner, conduct security awareness sessions for company employees. Also tell them not to store sensitive data on USB.
- Also, keep the flash drives used at home and the flash drives used in the office separate.
- If you want to store important data on a USB, use security methods like fingerprint.
- Also, don't connect USB devices that don't belong to you.
- Be sure to use a virus guard for your laptop.
- Update the security system.
- Do not go to use the network with free access.
- Keep your account username password protected. Also use strong passwords.
Comments
Post a Comment