1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Black Hat: How to make and deploy malicious USB keys

Discussion in 'Network World' started by RSS, Aug 4, 2016.

  1. RSS

    RSS New Member Member

    USB keys were famously used as part of the Stuxnet attack on the Iranian nuclear program and for good reason: it’s got a high rate of effectiveness, according to a researcher at Black Hat 2016.

    Of 297 keys spread around the University of Illinois Urbana Champaign 45% were not only plugged into victims’ computers but the victims then clicked on links in files that connected them to more malware, says Elie Burstzein, a Google researcher who presented the results.

    +More on Network World: Black Hat: 9 free security tools for defense & attacking | Follow all the stories from Black Hat 2016 +

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page