The majority of us are familiar with USB storage devices. They are employed for storing data. Because they are mobile and lightweight, we can transport them with us without any difficulties. Do you understand that these USB storage devices can be employed to compromise your system or install malware? This is recognized as a USB Discharge Assault.
What is a USB Discharge Assault?
In a USB Discharge Assault, a cybercriminal or a hacker strategically places a USB storage device so that the target or victim can discover it and connect it to his computer. Once the victim connects the USB storage device to his computer, the assault begins. Normally, USB flash drives are employed for this purpose.
Dangers or Consequences of a USB Discharge Assault
A victim of a USB Discharge Assault may encounter the following consequences.
- Phishing: An unknown USB flash drive is not secure to connect to your computer because it may contain files with embedded malicious links. If you open these files, you may become a victim of a phishing assault. By opening these files or clicking on these links, you will be redirected to a website where your confidential data or information may be compromised. Visiting these phishing websites can also install malware on your system which may lead to data loss or data theft.
- Malicious Code code execution: A hacker can also utilize a USB flash drive to execute the malicious code on your computer. The USB flash drives used for USB Discharge Assault have infected files. Opening these files will result in the execution of malicious code which may provide full control of your system to the hacker. Additionally, this may also lead to the deployment of Ransomware on your computer. Ransomware can encrypt your data and prevent you from accessing your computer. By encrypting your data, the cybercriminal will demand payment for a decryption key.
- HID (Human Interface Device) Spoofing: An HID or Human Interface Device is a computer device that humans utilize to provide input to the computer. In an HID Spoofing assault, the infected USB flash drive disguises itself as a keyboard. Since your computer believes that you have connected a keyboard, the USB flash drive injects some pre-configured keystrokes that activate the malware and provide the hacker with remote access to your computer.
Purpose of the USB Discharge Assault
Hackers execute USB Discharge Assaults to:
- Obtain remote access to the user’s computer.
- Destroy, steal, or encrypt data stored on the user’s device.
- Deploy malware on the user’s computer, such as Ransomware, Spyware, etc.
- Steal confidential information, such as credit card details or banking account passwords, organization’s data, etc.
Tips to Prevent a USB Discharge Assault
We have seen what a USB Discharge Assault is. Now, let’s discuss preventive measures to avoid a USB Discharge Assault.
- Always place your USB flash drive in a secure location where only you can access it.
- Always install a reliable antivirus program on your system that will keep you safe from cyberattacks.
- Do not connect unknown USB flash drives to your computer.
- Disable AutoPlay so that the connected USB flash drive does not open automatically.
Read: Command and Control Cyberattacks: How to Identify and Prevent them?
Is USB Killer real?
Yes, a USB Killer is genuine. It is a modified USB flash drive that supplies a high-voltage current into the device after you insert it into your device’s USB port. The primary objective of a USB Killer is to damage the user’s device.
Read: History and Evolution of Malware and Viruses
What are the USB threats?
An unknown USB flash drive can contain malicious files that can execute malicious codes on the user’s computer. This will result in data theft or data destruction. Therefore, it is always recommended not to utilize an unknown USB flash drive.
Read next: Why are websites hacked? How to prevent hacking?