How to shut down a plant remotely in 3 seconds.
3…2…1… and boom!
In my hand, I have a remote trigger that can fry the motherboard of any workstation, laptop, server, router, switch, monitor, IP phone, cell phone, firewall, etc. from up to 100 meters away. We can also schedule a date and time when the USBKill will trigger. It comes with all kinds of adapters to connect to other non-USB devices such as RJ-45, VGA, HDMI, serial port, USB-C, male, and female. To achieve its objective, the USB killer repeatedly supplies a voltage surge (210–220 volts) to the connected device and eventually toasts the internal motherboard and circuits. During our pen test, we demonstrate and highlight the importance of physical security.
Can you detect a USB killer device?
Unfortunately, you cannot distinguish a USB drive from a USB killer just by looking at it. You have to open the case of a USB drive to make that determination. A typical USB killer has several capacitors to store power from a USB port. If you want to assess whether a USB drive is a USB killer or not without opening its case, you will require a USB killer detector. However, a USB drive you just found in your parking garage could have been left there strategically to carry out a USB drop attack. So, it is unsafe to plug in an unknown USB drive into your computer, even if a USB killer detector rules out the possibility of it being harmful.
How to protect against a USB killer attack?
Unfortunately, there is not much you can do to prevent a USB killer attack. Disabling USB ports at the operating system level or using device control software cannot protect your device from the electrical surge delivered by the USB killer. Glue-shotting the USB ports, if possible, may be a temporary solution but it is not ideal. Additionally, there are many devices such as firewalls, switches, and routers that use RG-45 and are susceptible to this type of attack. Employee vigilance, physical security measures, access restrictions, and security awareness training could help companies minimize the risk for these types of attacks.