A USB is slightly more exciting than just a data store, it has its own internal microcontroller. This means it can transfer more than information, it can also transfer power. Which can be cool, I have a plasma ball that runs off a USB connection. Not to mention the coffee warmer I bought my brother… that also runs off a USB.
With this much power in a small device, it’s no wonder it has been used by malicious actors. I didn’t consider the security implications the first time I plugged the plasma ball in, I just thought it looked cool.
Someone turned a phone charging cable into a device that can hijack your computer. What’s to stop them from turning my innocent plasma ball into the same kind of attack?
Researchers in Israel have identified twenty-nine ways a USB can be used to attack. If there’s twenty-nine, why not thirty?
Hardware can be a digital threat. If you have the thirtieth attack or even a new way to turn my plasma ball into a malware vector, submit your paper to DTRAP for our special issue on the digital threats of hardware.