![]() ![]() Based on a small programmable board called Teensy and equipped with a USB-connector, they were able to act like HIDs, for example, sending keystrokes to a PC. The first such devices were written up back in 2010. A brief history of USB weaponsĭespite people’s forgetfulness, weaponized USB devices are also not news. Human interface devices (HIDs) such as keyboards and mice, charging cables for smartphones, and even things like plasma balls and thermal mugs, can be tampered with to target industrial control systems. So begins the story of how an air-gapped system at a nuclear plant got infected - it’s an all-too-familiar story of extremely avoidable critical infrastructure infection.īut people tend to forget that USB devices are not limited to flash drives. ![]() Most people who are in any way involved with security have heard classic tales about flash drives “accidentally” dropped in parking lots - it’s a common security story that is just too illustrative not to be retold again and again.Īnother - real - story of USB flash drives involved an employee working at an industrial facility who wanted to watch La La Land, so he downloaded the movie to a flash drive over lunch. USB devices are the main source of malware for industrial control systems, said Luca Bongiorni of Bentley Systems during his talk at #TheSAS2019.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |