Here's a List of 29 Different Types of USB Attacks

Faybert

Level 24
Thread author
Verified
Top Poster
Well-known
Jan 8, 2017
1,320
Researchers from the Ben-Gurion University of the Negev in Israel have identified 29 ways in which attackers could use USB devices to compromise users' computers.

The research team has classified these 29 exploitation methods in four different categories, depending on the way the attack is being carried out.

Reprogrammable microcontroller USB attacks
1) Rubber Ducky - a commercial keystroke injection attack platform released in 2010. Once connected to a host computer, the Rubber Ducky poses as a keyboard and injects a preloaded keystroke sequence.

2) PHUKD/URFUKED attack platforms - similar to Rubber Ducky, but allows an attacker to select the time when it injects the malicious keystrokes.

..
..
...
...
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top