• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Oh, It’s On Sale! USB Kill to Destroy any Computer within Seconds.

September 11, 2016 by Scott Radaszkiewicz 6 Comments

Article link: http://thehackernews.com/2016/09/usb-kill-computer.html

Wow!  Talk about your Super Spy type stuff.  (Queue Mission Impossible Theme Music now: https://www.youtube.com/watch?v=XAYhNHhxN0A).   

So now do we not only have to worry about the digital data that can be stolen or compromised, but now comes this new item that will basically destroy the internal components of your computer.   

This killer USB stick, once plugged into a USB drive, will charge capacitors within it and then release a deadly charge back into the system that will destroy internal components.  The company claims they developed the device for companies to test their devices for USB power surge attacks.  

You’ve been hacked and now, destroyed.   Trying to piece together what information has been compromised from a functional machine can sometimes be impossible.  Now, you might be left trying to figure out what happened without even having the machine available to you.   

It’s mind boggling that any person can get one of these devices for $49.95 over the Internet.   How do we combat hacking and theft, and now destruction, when the tools necessary to wreak havoc come so cheap!   Just another item in the constant dance to keep us on our toes!

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Shain R. Amzovski says

    September 12, 2016 at 9:26 am

    Scott,
    This is an interesting article. The first time I had read about this device was because it was trending on Facebook. Within a matter of seconds, a USB can destroy a computer. The company claimed this is necessary for proper IT security because companies should have their USB ports disabled on public machines. It seems as though Apple is ahead of the game with devices such as this. “However, the only devices not vulnerable to USB kill attacks are recent models of Apple’s MacBook, which optically isolate the data lines on USB ports.”

    Log in to Reply
  2. Ioannis S. Haviaras says

    September 12, 2016 at 9:40 am

    Scott,

    I read this article as well online. Its interesting to see how some attacks can not just steal personal information but to completely break a system. Someone who wants to do severe damage to a organization’s information could be on a tour of facilities and just sneakily plug this USB into a server causing it to fail. This goes to show that not only information security is a concern but also physical security in an organization.

    Log in to Reply
  3. Mengxue Ni says

    September 12, 2016 at 2:21 pm

    In the past, USB drives are always a device that help virus or malware to get in our computers. This is a $50 USB destroys a $1000 computer. I would say let’s not use USB anymore. Cloud is more convenience and safer to use. Cloud’s password may be breaching too but it won’t destroy your computer at least. Personally, I think USB is old technology that we can abandon now. However, nothing is one hundred percent safe.

    Log in to Reply
    • Noah J Berson says

      September 13, 2016 at 9:24 pm

      I don’t think that to respond to a vulnerability we remove the feature entirely. For most companies, losing a terminal is not losing data. They would respond to someone smashing the computer with a hammer the same way. Since the user needs physical access, other controls like monitoring who can use the computer or video surveillance means you’d be able to prosecute the saboteur and possibly get your monetary losses back. If you have to leave a computer in public, like a library, it probably is best to remove USB ports from the motherboard. The cloud can often be inconvenient to sign into compared to plugging a flash drive in. There is also data that some companies don’t want in a third-party’s cloud that would be ok on flash drives.

      Log in to Reply
  4. Wade Mackey says

    September 12, 2016 at 8:45 pm

    There is also a less dramatic software version developed as a response to the “Mouse Jiggler”. It detects USB activation and can wipe drives, shout down machines, or any other action the user wishes. Mouse Jigglers are USB devices that mimic slight mouse movement to prevent the activation of screen savers.

    Wade

    Log in to Reply
  5. Jason A Lindsley says

    September 12, 2016 at 11:46 pm

    Scott,
    I also saw an article on this and I’m glad you posted. I hadn’t seen the video, but I though it was kind of funny and scary at the same time Even with the sketchy shield, I wouldn’t plug one of those in my computer!

    I imagine that companies will begin to make hardware changes to address this threat, but many devices might be vulnerable to this threat until they are replaced. I wonder if you can protect against this threat with software changes (e.g. patches) or disabling USB via group policy. Otherwise, get the super glue out!

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in