The USB Kill Switch | Erase Your Data Instantly

11

A hacker, who also anonymously goes by the alias Hephaest0s, has just published an excellent anti-forensic wipe out software referred to as – usbkill. For those of you taking the name too literally, don’t fret, the software does not exactly do what the term “usbkill” may imply. Instead, the software maintains its observation on what is connected in your current USB slots, as well as also powers down your laptop or computer quickly if something shifts.

The software’s main concept is that it maintains its observation upon exactly what is connected directly into your USB plug-ins and, along with several adjustments, powers down your laptop or computer quickly.

Say for instance, you are notified that a police officer is outside your house, you would stop off your hard drive operating applications on all your PC systems, as well as position all your personal disk drives and USBs into a commercial de-magnetise for bulk chafing. Essentially, you may as well just dispose of them in a trash can and burn them. What if usbkill had been available to Sabu and the rest of LulzSec? – but what is history, is now history.

Furthermore, burning up or de-magnetising has been the primary convenient technique for online criminals and software and movie pirates. These individuals may then get away from law enforcement officers with absolutely nothing but a huge heap of clean devices and unused tapes as proof – nothing to see here.

In times like these, law enforcement officials  are eager to get evidence from computer systems while they are still operating and logged in. This allows them to utilize their particular unique keys to obtain access and take you by surprise, making your previous data removal procedure useless.

If power is maintained to your PC, the police officers would not need to get hold of your personal security passwords to gain access to elements like documents, Facebook, Twitter, other social media accounts, and networking links, etc. These people may be in a position to acquire information from storage drivers that will disclose important things, such as login details and passkeys for many of the accounts that you accessed recently, and a full record of the web pages that you have previously viewed.

However, with Hephaest0s’s “usbkill” tool, all an individual is required to do is eradicate the 3G device, or detach the dongle that runs your computer mouse. After this procedure, all the splendid necessary data files in storage are destroyed, even though the program code is composed in Python and requires to operate regularly as root.

Which leaves you to ponder over the fact: what if usbkill by itself is not hackable? Or if the police obtains your laptop or computer? In these cases, your current protective utility might end up becoming merely the very Elevation of Privilege or EoP—EoP is the easy way to get started in threat modeling and is a core component of the design phase in the Microsoft Security Development Lifecycle (SDL). The EoP card game helps clarify the details of threat modeling and examines possible threats to software and computer systems—toolkit that requires the cyber forensics crew to sift through your PC thoroughly.

Hephaest0s indicates that anyone can prevent this particular issue by applying a cable fastened USB key to either your hand or your wrist. Of course, usbkill will not help prevent the police from asking you to re-start you’re now shut down laptop or computer, but legalized safety for this appears to differ from region to region. Nevertheless, given that an individual does not have to disclose their security password, one can attempt to maintain a right to quiétude when questioned by officials to reveal the exact content of data files.


You want to support Anonymous Independent & Investigative News? Please, follow us on Twitter:


This Article (The USB Kill Switch | Erase Your Data Instantly) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and AnonHQ.com.

CLICK HERE TO SUPPORT US VIA PATREON

Get Your Anonymous T-Shirt / Sweatshirt / Hoodie / Tanktop, Smartphone or Tablet Cover or Mug In Our Spreadshirt Shop! Click Here

 

11 COMMENTS

    • Well if you have full disk encryption once someone restarts it, there would be a full disk encryption, so….

      If you want the best encryption have a 5lbs slug of neodymium to take out your hard drives, recommended to keep the slug atleast 10 feet from hard drives for the best precaution.

  1. Like many of your articles but your sites pop up advertising makes me nuts. Usually stop reading the article once the pop ups start as it is too irritating to navigate thru them
    Just wanted to mention it.

  2. where can I get it? pls post the link? It is just $19.95… but wait there is more…get a second one absolutely free (just pay extra shipping and handling) each sale will contribute $1.00 to Anonymous yes?

  3. but what if the federals download the malware instead of plugging a usb stick in the pc? the script apparently only runs when you execute it, so when the computer is restarted it won’t be running so they can plug the backdoor usb with no problem 🙂 also i thought it would be better if the usb would shutdown the pc upon detecting any newly added malware or suspicious file (either downloaded from the internet/local network or copied from a physical source) & delete the evidence files (specified by the user) that would be great

  4. How to configure it to make it run at startup? E.G. USB plugged in, laptop/pc shutdown, USB removed then re-plugged into laptop/pc, laptop/pc restarted/rebooted. I would like to see a tutorial on how to make it run at boot (when OS is booting) to make the laptop/pc go through this cycle whenever USB connection is detected.

LEAVE A REPLY

Please enter your comment!
Please enter your name here