Thursday, August 11, 2022
  • A Radware Minute – New Video Series
  • Why is Cybersecurity Essential for Small Businesses?
  • Digital milestones for elementary schoolers
  • NSA, DOE, MITRE and Industry Experts Share Advice on Building Cyber Resilience
  • Convergence and adoption of AI and ML countering the cyber threat

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security Security Bloggers Network 

Home » Cybersecurity » Data Security » Man fried over 50 college computers with weaponized USB stick

SBN

Man fried over 50 college computers with weaponized USB stick

by Graham Cluley on April 18, 2019

It’s not as though 27-year-old Vishwanath Akuthota made it hard for authorities to prove that he was the person who destroyed $58,000 worth of college equipment in February this year.

On Valentine’s Day, February 14th 2019, Akuthota walked around the campus of the College of Saint Rose in Albany, New York. He had graduated from the college in 2017 with an MBA, but as he was no longer enrolled, he didn’t have permission to be on the premises any more, and he certainly wasn’t authorized to enter multiple rooms containing computers on the campus.

What he did next, however, was worse.

Akuthota plugged a USB stick into 59 Windows PCs and seven Apple iMacs owned by the college. In addition, the former student plugged his device into the USB ports of multiple other devices including monitors and digital podiums.

Akuthota’s intention wasn’t to steal data from the computers, as you might expect, or to plant malware. Because what he held in his hand was “USB Killer,” a device which is capable of rapidly collecting power from a USB port and then sending a high voltage (technically, -200 Volts) back through the signal lines, effectively overloading and destroying the hardware.

“USB Killer” devices (sometimes referred to by other names including “BadUSB”) are freely available for purchase on the internet and are often marketed as a means to rapidly and permanently disable computer hardware. Of course, the people selling such devices don’t feel any responsibility to determine whether buyers will be using those devices with the permission of their owners or–as in Akuthota’s case–as part of an act of malice.

Perhaps Akuthota’s dumbest move of all, though, was to actually film himself on his iPhone as he committed his Valentine’s Day massacre.

According to court documents obtained by ZDNet reporter Catalin Cimpanu, (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Graham Cluley. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/man-fried-over-50-college-computers-with-weaponized-usb-stick/

April 18, 2019April 18, 2019 Graham Cluley backups, BadUSB, Featured Articles, IT Security and Data Protection, USB
  • ← Protecting the Secret Sauce: What You Need to Know About Intellectual Property (IP)
  • 5 Strategies That Will Really Grow Your Instagram Audience →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Slack App Leaked Hashed User Passwords for 5 YEARS
Twilio Fails Simple Test — Leaks Private Data via Phishing
GitHub Zero-Day: From 35K Repos Compromised to False Alarm
API Security: A Complete Guide
The Fall of Passwords and the Rise of Analytics
SOC 2 Compliance: Q&A with Compliance and Security Expert David Carter
Aspen Security Forum 2022 – Anja Manuel’s ‘Day 3 Opening Remarks’
Balbix brings Snow and Ice to Vegas @ BlackHat 2022
Aspen Security Forum 2022 – ‘The New Russian Empire?’
Is Your Government Organization Cyber Resilient?

Upcoming Webinars

Wed 17

Code Tampering: Four Keys to Pipeline Integrity

August 17 @ 1:00 pm - 2:00 pm
Mon 22

API Security

August 22 @ 1:00 pm - 2:00 pm
Wed 24

Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts

August 24 @ 1:00 pm - 2:00 pm
Tue 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous

July 21, 2022 Richi Jennings | Jul 21 0
How AI Secures the Future of Digital Payments
Application Security Cloud Security Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

How AI Secures the Future of Digital Payments

July 18, 2022 Natasha Lane | Jul 18 0
HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 Comments Off on HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

Top Stories

Twilio Fails Simple Test — Leaks Private Data via Phishing
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Featured Governance, Risk & Compliance Identity & Access Incident Response Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Twilio Fails Simple Test — Leaks Private Data via Phishing

August 9, 2022 Richi Jennings | 1 day ago 0
GitHub Zero-Day: From 35K Repos Compromised to False Alarm
Application Security Cybersecurity Featured Incident Response Malware News Security Boulevard (Original) Spotlight Threat Intelligence Vulnerabilities 

GitHub Zero-Day: From 35K Repos Compromised to False Alarm

August 8, 2022 Gabriel Liechtman-Manor | 2 days ago 0
Slack App Leaked Hashed User Passwords for 5 YEARS
Analytics & Intelligence API Security Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Incident Response Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Slack App Leaked Hashed User Passwords for 5 YEARS

August 8, 2022 Richi Jennings | 2 days ago 0

Security Humor

Robert M. Lee's & Jeff Haas' Little Bobby Comic - 'WEEK 393’

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 393’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.