The lost USB trick: how this dangerous attack works

We can be victims of many online scams and our computers suffer from a wide variety of cyber attacks. One of them is through connecting a simple USB stick . But how does the lost flash drive trick work? We are going to talk about how hackers use it to sneak malware onto our computers so they can steal passwords or cause system malfunctions.

Forgotten flash drive method

lost USB trick: how this dangerous attack works

We have all used a flash drive at some point. In this type of memories we can save files or any document. For example, if we are going to go to a store to print something or we want to pass a job to a classmate. They even serve to transfer files from one computer to another.

Therefore, the fact that it is something so widely used and common also makes hackers set their sights here. They can use the trick of leaving a forgotten flash drive anywhere and pretend that it is lost. For example in a cafeteria, library, university or directly on the street.

The objective is that whoever finds it connects it directly to their computer to see what is there. Maybe even in an act of good will use it to see if there is some kind of data to know how to return it. But of course, just with that small gesture you can see how your computer is infected with malware .

In recent times, there has been an increase in this type of attack . A USB memory actually costs very little money, so an attacker can use it as a physical bait for the victim to install malware or access a computer. In this way they can later obtain an economic benefit.

SecurStick para proteger tu pendrive

Data theft and revenue

What could a hacker do with a USB stick left lying on the street? They may contain malware that runs automatically as soon as you connect it to your computer. For example, they could steal personal data , something that is very valuable today, and put it up for sale on the Internet.

They can also use it as an entry point for ransomware . These types of threats aim to encrypt files and systems. Later they ask for a financial ransom to free them, something that can affect both home users and even large companies and organizations that see their computers become unusable.

Hackers may even simply want to run tests . They use those who find those memories as guinea pigs and can carry out different attacks to, in the future, implement it on a large scale and reach more victims. A way to refine whatever malware they’re creating, for example. You can see that there are different methods to infect with a flash drive.

In short, taking a flash drive that we find and plugging it into our computer is not a good idea. It is possible that someone has left it there with the aim that we take it and infect our system. It is important not to make these types of errors and keep our system protected with a good antivirus at all times, in addition to keeping everything updated to correct possible vulnerabilities.