Which type of malware uses USB firmware changes to directly interact with the operating system?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which type of malware uses USB firmware changes to directly interact with the operating system?

Explanation:
USB-based malware targets the USB hardware itself by changing the firmware on the USB controller. By rewriting that firmware, the device can present itself as a trusted USB device (often an HID like a keyboard or a mass storage device) and execute code or issue commands as soon as it’s connected. This lets the malware interact directly with the host operating system at a low level, bypassing many software-level defenses and enabling persistence, payload delivery, or keystroke injection without needing to exploit software on the host first. The other terms don’t specifically describe this hardware/firmware compromise: one is not a standard malware category, another is too vague about targeting and method, and the last refers to the activity of analyzing malware rather than a type of malware.

USB-based malware targets the USB hardware itself by changing the firmware on the USB controller. By rewriting that firmware, the device can present itself as a trusted USB device (often an HID like a keyboard or a mass storage device) and execute code or issue commands as soon as it’s connected. This lets the malware interact directly with the host operating system at a low level, bypassing many software-level defenses and enabling persistence, payload delivery, or keystroke injection without needing to exploit software on the host first. The other terms don’t specifically describe this hardware/firmware compromise: one is not a standard malware category, another is too vague about targeting and method, and the last refers to the activity of analyzing malware rather than a type of malware.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy