

Eventually, it changes the computer’s “Domain name system” and directs you to insert a URL for a website to secretly redirect your traffic.ģ. Another way it could be damaging is when the USB device pretends to be a network card. A device could falsely act as a keyboard and issues its own commands to the control system for a malicious act such as to install malware or to steal files.Ģ. Unfortunately, the malware presence is noticed when there are certain symptoms of destruction and malware in a single device could lead to other PCs in your home or organizational network.Ī USB could act maliciously in three ways as predicted by Nohl and Lell ġ. This could result in destruction much like the previous one through floppy disks, that is, a self-replicating virus that spreads through sparing thumb drives.Īccording to US-CERT, the has reported that 25 percent of the malware are transferred through USB drives. Through such methods the USB is used to transmit the firmware-modifying code to the device it is inserted.

Thumb drives or other USB peripherals can be reprogrammed to steal any data written into the drive.

More: Watch out for this USB Device Charger, it could be Keystroke Logger: FBI This could be an extreme judgment however, these could at least bring a suspect to the efficiency and trustworthiness of the routine devices we insert to our PCs such as keyboards, flash drives, external hard drives, mouse, and more.Īccording to the findings of researchers, Karsten Nohl and Jakob Lell at Security Research Labs, the USB manufacturers do not protect the firmware in USB devices and therefore, a malware could likely overwrite the firmware and could take over the device’s control. The flash drives are designed in a way that could have some security flaws in them and according to some researchers, these could impact day-to-day computing. The properties of USB drive such as portability and on-the-fly connection to various networks makes it more prone to losses such as physical control and network security breaches. Whereas, the data transfer contains some extreme security risks without you being able to judge the vulnerability before potential destruction. However, the overwhelming rise in the use of such devices has also raised incidents regarding privacy. In the mid of the previous year, the famous WikiLeaks Vault 7 series has accused the CIA of infecting USB drives for injecting malware into the PC or device to which they are connected. However, with the perspective of security, these USB drives could prove to be vulnerable to your devices. A flash drive or USB may provide capacity as large as 2TB or could have a small space of 256 MB but it caters to the individuals in many aspects especially to store data.
