USBKill - immediate deactivation of a machine via a USB stick

USBkill is a new program which, when activated, instantly disables the computer where it is connected via USB in order to protect the data it contains. It transforms a simple USB key into "kill switch".



Be careful not to be confused with the famous USB PC killer "Killer USB" he presented a few months ago, that it goes to the destruction of components of the target machine when the device is connected physically on.

USBKill is a new weapon that could be a boon for whistleblowers and whistleblowers, investigative journalists in sensitive areas, activists, and even criminals who want to maintain at all costs their confidential information out of the reach of authorities or hackers.

The principle is simple: in an emergency, simply unplug the USB drive of the device cause the complete deactivation of the machine to which it is connected. So, even if the machine is physically recovered, it will be locked and the data it contains will be safe. USBkill triggers it via USB, then transformed into a kind of "kill switch", forcing the systems to stop if it is disconnected.

Hephaestus (@ h3phaestos), the author of USBkill, reports that the tool will help to protect the users of hard knocks:


"USBKill expects a status change on your USB ports, then immediately kill your computer, much like a self-destruct system", he said on Github.
This is actually a Python script that is installed on the machine that will monitor the status of the USB ports. In this case the script monitors the introduction and the extraction of a key on a USB port on the machine. If the state changes, ie if a key is removed, he will immediately turn off the PC.

Hephaest0s, the developer who designed the script and made available on GitHub, seems to have everything. It lists at least three reasons - more or less honest - to use his script. He thinks well to small and micro businesses that could see in this script a way to further secure their data servers. To avoid that a spy can not copy data using a key, it would be enough to install on the server ...

For people on the outs with the police, he cites the case of "mouse jiggler" used by police. These small USB dongles simulate an activity on port to prevent the computer from going to sleep and thus to lock. In this case, the introduction of this unexpected key will turn off the computer, blocking access to its content. Content that will obviously be totally encrypted, as it should. If the removal of the key would be used to turn off the computer, Hephaest0s even advises to attach it to his wrist by a thread. Thus, if the user is dragged away from their computer or if the PC is stolen from him, it will go out immediately ... Obviously this is more intended for paranoid!

The author of USBkill also indicates that the program could be very effective when run on a virtual machine, which will disappear when you reboot. USBKill will soon have additional functions in the future. However, it works perfectly in its current state.
Previous
Next Post »