
The Stuxnet attack discovered in 2010, for example, famously infected (Opens in a new window) Iranian nuclear development sites. One of the most concerning aspects of USB attacks is their ability to give hackers remote control of a system. Bad USB devices can also be used to damage or destroy a computer by delivering an electrical charge. (Illustration: Oleksandr Hruts/Getty Images)Ī USB attack pretty much does what it says on the tin: it uses a USB-connected device, like a thumb drive or hard drive, to get malicious software into a computer or other USB-connected device, such as a smartphone.


