USB Threats

Authors

  • Sami Mehtonen Industry Professional
  • Mitha Jose
  • Seppo Koponen

Keywords:

implant attacks, USB, Hotplug, USB Threats

Abstract

This article aims to explore the evolution of USB attacks from their inception to the present day. By examining the equipment, history, and threat posed by USB hotplug attacks, this study builds on previous research and a comprehensive literature review of related technologies. This foundation has been utilized to understand the increasing prevalence of USB threats, their technological advancements, potential impacts, and prevention methods.

The findings indicate that the trend of USB-targeted attacks has been on the rise, significantly impacting various societal functions and industries. The study underscores the need for further research on USB attacks and the development of protective measures to address vulnerabilities that have emerged alongside the evolution of USB technology.

Author Biographies

  • Mitha Jose

    Laurea University of Applied Sciences, Leppävaara Campus, Vanha maantie 9, 02650 Espoo, Finland.

  • Seppo Koponen

    Laurea University of Applied Sciences, Leppävaara Campus, Vanha maantie 9, 02650 Espoo, Finland.

References

[1] V. P. Dung, A. Syed, A. Mohammad and M. N. Halgamuge, "Threat analysis of portable hack tools from USB storage devices and protection solutions," Karachi, Pakistan, 2010.

[2] Honeywell, "USB SECURITY- MYTHS VS. REALITY.," Honeywell Process Solutions, Houston, TX, 2020.

[3] B. Cannols and A. Ghafarian, "Hacking Experiment by Using USB Rubber Ducky Scripting," 2017.

[4] K. Nohl, S. Krißler and J. Lell, "BadUSB — On accessories that turn evil," Tokyo, Japan, 2014.

[5] P. Walters, "The Risks of Using Portable Devices," 2012.

[6] Proofpoint, "State of the Phish 2022," DXC Technology, 2022.

[7] Honeywell, "HONEYWELL GARD USB THREAT REPORT 2024," Honeywell, 2024.

[8] M. Tischer, Z. Durumeric, S. Foster, S. Duan, A. Mori and E. Bursztein, "Users Really Do Plug in USB Drives They Find," San Jose, CA, USA, 2016.

[9] B. Anderson and B. Anderson, Seven Deadliest USB Attacks, Burlington, USA: Syngress (an Imprint of Elsevier, Inc.), 2010.

[10] D. Kierznowski and K. Mayes, BADUSB 2.0: EXPLORING MAN-IN-THE-MIDDLE ATTACKS, Royal Holloway, 2015.

[11] J. Axelson, USB Complete: The Developer's Guide, Fourth Edition ed., Chinook Ln.: Lakeview Research LLC, 2009.

[12] E. Alm and A. Aaris-Larsen, "USB Hid-and-Run." Internet: https://github.com/piraija/usb-hid-and-run, 2023[Jan. 16, 2025].

[13] J. Queppet, "The Hardware Components of a USB Rubber Ducky," 2018.

[14] Hak5, "OMG-Cable." Internet: https://shop.hak5.org/products/omg-cable,2025 [Jan. 31, 2025].

[15] Blue Goat Cyber, "Hacking Tool: Bash Bunny."Internet: https://bluegoatcyber.com/blog/what-is-a-bash-bunny/, 2025 [Jan. 30, 2025].

[16] Hak5, "Bash Bunny by Hak5 Product Documentation." Internet: https://docs.hak5.org/bash-bunny, Jun. 2024 [Jan. 30, 2025].

[17] Flipper, "Flipper Zero Documentation, Bad USB." Internet: https://docs.flipper.net/bad-usb, 2025 [Jan. 30, 2025].

[18] Flipper, "Flipper Zero - Portable Multitool for Geeks." Internet: https://flipperzero.one/, 2025 [Jan. 30, 2025].

[19] M. Nicho and I. Sabry, "Bypassing Multiple Security Layers Using Malicious USB Human Interface Devices," Lisbon, Portugal, 2023.

[20] mg, "omg-cable." Internet: https://mg.lol/blog/omg-cable/, Feb. 11, 2019 [Jan. 31, 2025].

[21] Flipper. "BadUSB File Format." Internet: https://developer.flipper.net/flipperzero/doxygen/badusb_file_format.html, 2025 [Jan. 31, 2025]

Downloads

Published

2025-08-25

Issue

Section

Articles

How to Cite

Sami Mehtonen, Mitha Jose, & Seppo Koponen. (2025). USB Threats. International Journal of Applied Sciences: Current and Future Research Trends , 23(1), 87-93. https://ijascfrtjournal.isrra.org/Applied_Sciences_Journal/article/view/1542