Skip to Content

Researcher Details USB-Based Attack That Circumvents All Known Protective Security Measures

usb3Security research Karsten Nohl of Berlin's SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures used by a computer. In a report by Wired, Nohl says his BadUSB exploit is "almost like a magic trick" because "you cannot tell where the virus came from."

The exploit takes advantage of a flaw that allows a hacker to tamper with the firmware that controls the functions of USB devices such as mice, thumb drives and keyboards.

Because BadUSB resides not in the flash memory storage of USB devices, but in the firmware that controls their basic functions, the attack code can remain hidden long after the contents of the device’s memory would appear to the average user to be deleted. And the two researchers say there’s no easy fix: The kind of compromise they’re demonstrating is nearly impossible to counter without banning the sharing of USB devices or filling your port with superglue.

“These problems can’t be patched,” says Nohl, who will join Lell in presenting the research at the Black Hat security conference in Las Vegas. “We’re exploiting the very way that USB is designed.”

Nohl, along with fellow SR Labs researcher Jakob Lell, will present additional details on this attack during a presentation at the annual Black Hat hacking conference, which will be held next week in Las Vegas. The title of his presentation is "Bad USB - On Accessories that Turn Evil."

Popular Stories

iphone fold text

iPhone Fold Crease Measurements Revealed as Device Hits Production

Wednesday February 25, 2026 5:37 am PST by
Apple has submitted production line orders for its upcoming foldable iPhone, effectively confirming that the device will launch this year, claims a Chinese leaker. According to the Weibo account "Fixed Focus Digital," assembly lines recently received the orders from Apple, which has apparently allowed the leaker to learn the crease measurements for the device's 7.8-inch inner display....
Low Cost A18 Pro MacBook Feature Pink

Leaker Says Apple's Lower-Cost MacBook Will Have These 8 Limitations

Wednesday February 25, 2026 9:25 am PST by
Apple is expected to unveil its long-rumored lower-cost MacBook next week. Given it will be more affordable, this MacBook model will obviously have some reduced specs and compromises compared to the MacBook Air and MacBook Pro. While we are still waiting for Apple to announce the new MacBook, a leaker has shared eight alleged limitations to expect, based on an internal version of Apple's...
m3 macbook pro blue

M5 Pro and M5 Max MacBook Pro: What to Expect

Wednesday February 25, 2026 3:02 pm PST by
Apple is working on a new MacBook Pro that could launch next week ahead of the "Special Experience" planned for March 4, so we thought we'd highlight all of the rumors about the device so far. Design There are no rumors of design changes, and we are expecting the upcoming M5 MacBook Pro models to look just like the M4 versions. Apple will continue to offer 14-inch and 16-inch size options,...

Top Rated Comments

151 months ago
I'm going back to only using a pen and paper from now on.
Score: 28 Votes (Like | Disagree)
151 months ago
Jack Bauer has been doing this for years.
Score: 24 Votes (Like | Disagree)
151 months ago
Nobody cares about wired attacks

This is not 1980 anymore when people used to worry about viruses on floppy disks. If a person has physical access to your computer, it is a failing with the security in your building or home, not the technology.

Just use the same kind of restrictions you use personally and not let someone stick something in any of your ports or slots unless you want them to and know they are clean.
Score: 17 Votes (Like | Disagree)
151 months ago
Interesting. In other news, remember kids, Apple is completely wrong to not include obsolete legacy ports like USB on their modern iOS devices.
Score: 11 Votes (Like | Disagree)
dejo Avatar
151 months ago
Jack Bauer has been doing this for years.

Wouldn't he leave this up to Chloe? ;)
Score: 9 Votes (Like | Disagree)
LV426 Avatar
151 months ago
At the end of the day, any malware that happens to be on a USB device has to be able to make it into the target computer. The article talks a lot about PCs which, historically, have been quite easy to compromise.

Just suppose I stuck one of these nasty devices in my Mac. OK, it's fiendish, it's an empty gadget. And then its bad firmware kicks into life and tries to persuade my Mac that files are available. That file still has to make it onto my Mac and has to be an executable to do any harm.

I believe OS X's inbuilt defences against malicious files - wherever they come from - would not be circumvented by a gadget like this.

My PC on the other hand...
Score: 6 Votes (Like | Disagree)