Meet USBee, the malware that uses USB drives to covertly jump airgaps

Technique works on virtually all USB drives with no modifications necessary. In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB device allowed spies to surreptitiously siphon data out of targeted computers, even when they were physically severed from the Internet or other networks. Now, researchers have developed software that goes a step further by turning unmodified USB devices into covert transmitters that can funnel large amounts of information out of similarly “air-gapped” PCs.

(Visited 289 times, 1 visits today)