2 min read
Researchers turn USB cable into attack tool


This article talks about a new security exploit computers which uses an (Oh-theyre-everyhhwere) USB device to gain access to a computer.A university professor and his student from George Mason university modified a Android to ‘take control’ of a computer.What they basically did was alter the device drivers/device ID of the phone so that it was recognised by the computer as an HID(Human Interface Device) or in simple terms .. a keyboard.Since the device was now recognised as a normal keyboard ,they could now use it as a normal keyboard!The basic premise of the attack is that the USB protocol doesn’t require any authentication of connecting devices.I don’t know how this is termed as ‘exploit’ because this very technique (of making one device get recognised as another) is widely used by Electronics hobbyists to control electronic devices using their PC’s.Also, as noted by commenter’s on the post(the post has some really funny comments BTW ) ;if you’re close enough to plug in your phone (which is then recognised as keyboard ) ,you might as well use the attached keyboard! The Ultimate Anti-Virus
However, a possible scenario where this could be security threat would be if the attackers made a small chip that gets recognised as a keyboard and communicated with that chip wirelessly.(Still requires you to ignore an unknown small thing stuck in your USB port!)