This Mission: Impossible-esque USB Dongle Explodes After Delivering a Malicious Payload

First off, we need to jump on the safety bandwagon here and tell you not to do this yourself—both because delivering a malicious payload is…

Cameron Coward
6 years ago

First off, we need to jump on the safety bandwagon here and tell you not to do this yourself—both because delivering a malicious payload is rude, and because we don’t want you to hurt yourself. Alright, disclaimer out of the way, let’s get to the fun stuff. This is a USB dongle that delivers a keystroke-injection attack, and then explodes when the attack has been completed.

A keystroke-injection attack, if you’re not familiar, is a simple way of attacking a computer by using a USB dongle that looks like a keyboard to the computer. Once it’s been plugged in, virtual keystrokes are sent to the computer to execute some sort of code, download and launch malware, or open a website. Because of its simplicity, the attack is actually pretty difficult to protect against.

MG’s version does just that, but adds a little extra flair. After the keystroke-injection is completed, a small explosive embedded in the USB dongle is triggered—destroying the evidence. For obvious reasons, MG doesn’t explain exactly how he built the self-destruct feature, but it’s not too hard to figure out (as a purely-hypothetical thought exercise, of course).

Cameron Coward
Writer for Hackster News. Proud husband and dog dad. Maker and serial hobbyist. Check out my YouTube channel: Serial Hobbyism
Latest articles
Sponsored articles
Related articles
Latest articles
Read more
Related articles