Meet CybrIQ at InfoComm 2026 · Booth C5052 · June 13–19 · Las Vegas · Pre-book a working session →
Article · USB Attack Surface

USB attack hardware costs $80.

A Hak5 Rubber Ducky is sold openly online for less than the price of a steak dinner. It looks like a thumb drive. Plug it into a corporate workstation and it types a thousand-line script into the operating system in three seconds. The carriers have started asking about removable-media controls because the underwriting math now reflects the fact that this hardware is in the bottom drawer at every Black Hat conference.

By the CybrIQ team · 7 minute read

The hardware, briefly.

Five categories worth knowing by name. The Hak5 Rubber Ducky pretends to be a USB keyboard and types scripted keystrokes at machine speed. The Flipper Zero does the same thing in a different form factor that looks like a child's electronic toy. The O.MG cable hides the same script-injection capability inside a USB charging cable visually indistinguishable from one shipped with an iPhone. BadUSB-class HID-spoofing devices declare themselves to the operating system as keyboards while actually being storage or network adapters. And rogue USB mass-storage with autorun-class payloads is the oldest of the group and the easiest to overlook because it presents as the thumb drive it appears to be. Together, the entry-price tier of all of this is under $100.

Why NAC and EDR miss it.

USB attack hardware is purpose-built to ride a port the network already authorized. The workstation is still on its switchport. The MAC is the same MAC. The OUI is the same OUI. NAC sees no posture change. EDR sees the spawned activity but cannot reliably attribute it to the device that spawned it. Switch-side device-identity tooling sees the same workstation it saw a minute ago. The detection has to happen at the USB stack on the host, because that is where the device is visible. Everything above Layer 1 is blind to it by design.

The five frameworks that ask about it.

PCI DSS 4.0 Requirements 9.5 and 9.6 cover physical handling of removable media. HIPAA Security Rule §164.310(d)(1) Device and Media Controls covers receipt and removal of hardware and electronic media containing ePHI. SOC 2 CC6.7 (Restriction of Information Assets) covers transmission, movement, and removal of information to authorized users and processes. CMMC Level 2 MP.L2-3.8.7 (Control Removable Media) is explicit by name. NIST CSF 2.0 PR.PT-2 cross-cites all of the above. Five framework checkboxes, one underlying question: can you prove that an attack tool plugged into the controller's workstation would not have free run?

The carrier-questionnaire angle.

Healthcare cyber-insurance underwriters have been asking about removable-media controls since the 2024 renewal cycle. SMB carriers caught up in 2025. The question on the questionnaire is some variant of "describe controls in place to prevent the introduction of unauthorized removable media." A policy document does not pass anymore — the underwriter wants evidence of technical enforcement. Brokers report that questionnaires with "we have a policy" answers are coming back with follow-up requests; questionnaires with detection-feed evidence are clearing first-pass review.

What detection actually looks like.

The mechanism is straightforward and the false-positive math is favorable when done well. A small endpoint agent enumerates the USB device tree the operating system already exposes — VID, PID, device class, descriptor, serial — and matches every observed device against a curated signature database of known attack hardware. The Rubber Ducky family, the Flipper Zero HID profiles, the O.MG cable signatures, the BadUSB-class re-flashed-firmware patterns. The match is deterministic: same descriptor, same lookup result. False positives concentrate on legitimate multi-interface devices (composite USB hardware like docking stations) which the allow-list handles per-host. Suppressed entries are logged for auditor visibility, so the absence of an alert is itself an evidence-bearing artifact.

What detection doesn't replace.

Detection isn't prevention. A USB-port lock at the OS level still belongs in the endpoint policy. A DLP suite still handles file-content analysis. A USB attack-tool detection feed catches the specific class of hardware those policies cannot identify by themselves — the device that pretends to be a keyboard, the cable that pretends to be a charger. Pair it with the policy and the DLP, not against them.

The detection mechanism — workstation agent, signature database, USB-Ethernet detection on the network side — is documented in the technology overview. The 30-day pilot terms, including the optional USB-agent rollout to high-risk endpoints, are at cybriq.io/pilot. Reach contact_us@cybriq.io for the framework-mapped evidence pack.