Quote:
Originally Posted by Nath2099
I remember an experiment where a security analytic firm dropped a few dozen USB sticks around a government facility. Something like 80% of them were picked up and plugged in. Air gap crossed. Again, once you cross the air gap, a myriad ways to compromise the system further. I have heard that the NSA is able to hack a phone and use that to talk in high frequency signals using it's speaker to the compromised system. But who knows.
|
The IT department at my work did that exact same experiment.
They left 5 around. One of them prompted someone to report a 'found' USB stick in an effort to find the owner, but the rest were put straight into the network, with a mock virus notifying IT of who did it.
As a result, we all had to undergo follow up security training.