It’s Unbelievable How Something as innocuous as a USB Drive can destroy your Computer!

You do, Do you?

When you turn on your computer for work, how many of you take a look at the back of it? Do you ever check to see if your computer has any additional hardware connected before you get started? If you don’t, I can assure you that you will in the future.

A simple DIY USB is all that is needed for someone to hack into your system and take complete control of it. I’ll show you how to do it! Please keep in mind that the content of this article is intended solely for educational purposes.

USB and HID Devices

USB was revolutionary. It’s the easiest way to connect devices, transfer data, store data, charge devices, etc. USB protocol behavior varies by function. Most keyboards and mice are USB, right? Human Interface Devices (HID). Human Interface Devices (HID) take user input and send it to a connected device.

Keyboard keys all have keystrokes. When you press a key on your keyboard, the computer prints it in your notepad via USB. But what if the keyboard sends keystrokes to open a terminal and type a command that gives hackers complete control of your system without you pressing any keys?

New cyber-threat to be aware of! Hackers are making their own DIY Rubber Ducky and Bad USB HID Attacks using Arduino and Digispark to hack computers.

It’s easy to make our own HID USB devices, especially keyboards. Just use this cheap microcontroller. It’s useful, yes. We can create customized devices like this Photoshop Control Panel I made last month or a Media Controller.

USB HID Attack

This functionality can also be used maliciously. How? A person can take control of your system with one line of code. 

There are additional ways in which an attack of this kind could take place against both you and your computer. They could deceive you into connecting these infected USB drives to your computer, which would put your system at risk. It is possible that you are a victim of this cyber attack, but you might not be aware of this fact just yet.

Look at it for yourself! Learn more about HID attacks and how they are carried out with Demo by reading more about it – How DIY USBs are used to Hack Computers? HID Attack using Digispark & Arduino

How to Protect Yourself?

How can we protect ourselves from these assaults and stay safe? Never, ever, ever connect your computer to any unknown devices. Always look behind the central processing unit (CPU) of your computer before turning it on to make sure there are no unauthorized devices connected to it. When you step away from your computer, you should make sure to lock it. Ignore any orphaned USB devices that you find, even if you find more than one. Do not even entertain the idea of connecting it to your personal computer.

Read the Full Article – How DIY USBs are used to Hack Computers? HID Attack using Digispark & Arduino

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *