This Terrifying Gadget Infects Your Computer From Any USB Port - Here's How

Cybersecurity is often described as a cat-and-mouse game between defenders and attackers. Defenders work on protecting systems by patching vulnerabilities through research and development, while attackers use sophisticated tools to breach those defenses, sometimes via AI-driven methods like vibe coding or vibe hacking. One tactic that defenders and researchers use to learn more about the attacking side is called penetration testing. They willfully hack into systems, breach controls, or follow principles the attackers would use to discover new ways to create defenses. More specifically, they look for vulnerabilities that might appear and other concerns that might weaken security systems. That's precisely the idea behind a frighteningly effective device called the Diabolic Parasite.

Rightfully labeled a parasite, the small USB device works as a bridge intercepting connections between a peripheral and a PC. It supports keystroke injection, keylogging, wireless access, and uses highly advanced measures to avoid detection. You first plug an HID device like a keyboard or mouse into the female USB port on the parasite, then plug the other side into an open USB slot on the PC. The parasite clones the connected peripheral's hardware identity to look like a trusted device, becoming virtually invisible to the host system and security tools.

Built for hands-on security testing, it can wirelessly deliver a payload to help simulate threats, or even test attacks against physical systems. As scary as it sounds, this one is for the good guys — the white-hat hackers — but it does indicate that nefarious parties could either build something similar or have something comparable already. It has to be physically plugged in by someone, but one of the most common mistakes people make with USB flash drives is connecting untrusted devices to their PC.

How does it remain invisible and stealthy?

When it's plugged into a system, between an HID peripheral and the computer, it moves all data through a hardware-based HID channel, which is the very same data channel used for gaming mice, RGB peripherals, firmware updaters, and other USB hardware. Security tools effectively ignore this channel when scanning, since treating it as suspicious would trigger false alerts from nearly every peripheral in use. Moreover, the tool allows attackers to use a software shell, called Diabolic Shell, through this channel to issue commands, log data, and essentially spy on users.

Unit 72784, the team behind the device, says it can mimic the exact USB identity details of the input device you plug it into — PID, VID, manufacturer strings, and more. The host system sees it as a fully trusted device, so it never prompts users to install new drivers and doesn't alert security tools, even those that monitor for new USB devices. During keystroke injection, it even mimics the natural cadence of humans typing on a keyboard. That prevents it from being flagged by behavioral detection systems as well.

Commands can execute without logs, files can be exfiltrated or moved off the PC without network traces, and all traffic is indistinguishable from regular USB device behaviors. The goal, of course, is to provide a hands-on platform and useful tool for exploring advanced attack techniques that are able to remain under the radar. It simulates a real-world scenario. A highly sophisticated real-world attack scenario, mind you, but something that's clearly possible. It's not exactly a USB kill stick, like those used for pentesting, but it is still dangerously effective.

Recommended