Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » "USBdriveby" emulates mouse and keyboard to hijack computers

"USBdriveby" emulates mouse and keyboard to hijack computers

2014/12/18

Securityweek - (International) A researcher demonstrated an attack method known as USBdriveby that can use a USB-based microcontroller to emulate a mouse and keyboard to run several tasks including disabling security measures, opening backdoors, and changing DNS settings due to many systems trusting USB devices by default. The researcher tested the method on an OS X device but believes that it can be used on Windows and Unix operating systems, and the source code and operations for the attack were made public.

Source: http://www.securityweek.com/usbdriveby-emulates-mouse-and-keyboard-hijack-computers

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:22:50