USB Drop Attacks: The Low-Tech Cybersecurity Threat Businesses Still Ignore

Despite being a low-tech cybersecurity threat, USB drop attacks continue to compromise sensitive data in companies across Europe and beyond.

Scroll down

Why Plugging in Unknown USB Devices Is a Cybersecurity Risk

Inserting an unknown USB stick into a company computer is a major IT security violation. Not all cyberattacks are complex or highly technical. Some are shockingly simple and still incredibly effective.

One of the most basic yet dangerous methods is the USB drop attack: cybercriminals leave infected USB drives in public places, hoping someone will pick one up and plug it into their device. Once connected, malware can be installed, giving attackers access to sensitive files and systems.

"USB drop attacks might seem like yesterday’s way of doing cyber-attacks, but they are really not. This is a highly effective an inexpensive way of attacking businesses, and these types of attacks are also very much an issue in Europe. Problem is that you do not know if the security features on your computer will protect you from this type of attack. So the best advice is to never plug an unknown USB stick into your computer. "

Philip Törner

Social Engineering: How Human Behavior Fuels Cyber Threats

Stefan Lindau, Nordic Manager at Panasonic, emphasizes the social engineering aspect of these attacks:

"This type of attack exploits the basic human tendency of wanting to pick up an object from the ground when we come across it. Especially if it has some kind of value or if it is something that you would want to recycle. It could be a coin, a bottle or a USB drive. Furthermore, a USB stick in your pocket will at some point spark your curiosity why you might plug it into your computer to see what is on it. At that point, the intruders have full access to your files and possibly all the files that ever existed in the company you work for."

Stefan Lindau

Real-World Cybersecurity Statistics: USB Drop Attack Success Rates

In a 2022 cybersecurity experiment, 300 USB sticks were dropped outside a U.S. university. The results were alarming:

  • 98% of the devices were picked up.
  • 45% were plugged into computers.

Many of these drives were labeled with tempting phrases like “Confidential Drive” or “Final Exam Solutions,” making them irresistible to curious finders. According to Törner, similar results would likely occur in Europe.

Emerging Threats: Malicious USB Charging Cables

Cybercriminals are constantly innovating. New threats include malicious USB charging cables that look normal but contain hidden implants. These cables can:

  • Launch unauthorized software
  • Install spyware or ransomware
  • Steal saved passwords
  • Transmit sensitive data over the internet

"These attacks are extremely simple to construct and, therefore, still very much used. Cyber criminals are even developing new tools such as phone charging USB cables with advanced implants hidden inside them. In large organizations, we have observed these types of attack paralyzing the very security monitoring teams, that analyze security incidents on a daily basis. The amount of USB security alerts is sometimes overwhelming, and we should all be much more aware of this problem and take the necessary action to protect ourselves."

Philip Törner

Cybersecurity Best Practices for Businesses

  • Never plug in unknown USB devices; even if they look harmless.
  • Educate employees about social engineering attacks and curiosity-based threats.
  • Implement strict USB device policies and disable ports where possible.
  • Use endpoint protection software to detect and block USB-based threats.
  • Stay updated on emerging threats like malicious hardware implants.

Read more insights…

Sorry there was an error...
The files you selected could not be downloaded as they do not exist.

You selected items.
Continue to select additional items or download selected items together as a zip file.

You selected 1 item.
Continue to select additional items or download the selected item directly.

Download selected file