Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Shocker: Net anarchist builds sneaky 220v USB stick that fries laptops

Some folks just want to watch the world burn


Vid An internet mischief maker has built a USB stick that delivers dangerous 220-volt shocks to PCs, destroying them in the process.

The USB Killer is the second iteration of a laptop-wrecking device crafted by a Linux and infosec techie nicknamed Dark Purple. The first version of the PC-zapping hardware emerged in March, and pumped 110 volts of anarchic fun across motherboards.

"The device performs only one function: the destruction of computers," the Purple one wrote in a Russian-language blog post this month.

"But let's not limit it to computers. The device is able to incapacitate almost any equipment with a USB host interface. The main feature of the new version of the device is the doubled output voltage, which is 220 volts (strictly speaking, minus 220)."

The USB zapper looks like any conventional USB stick.

The Russian tinkerer says it uses a voltage converter that charges capacitors to 220V when plugged into a machine, drawing the power needed to do this from its victim. The stored energy is sent back through the USB interface, and the process is repeated until the computer drops dead.

It's a more sophisticated Etherkiller, but for USB.

The booby-trapped USB could fry smartphones that support USB OTG mode, plus TVs, routers, and other equipment, Purple says. If the circuitry is not designed to take a large amount of juice, it will fail. Typically, USB interfaces deal with five volts and up to 500mA for USB 2.0 and 900mA for USB 3.0 in current.

Youtube video demonstrating the USB killer stick

Security researchers have shown that employees will pick up mysterious USBs they find in parking lots and offices and plug them into their work computers. Doing so with one of these high-voltage charging sticks will send sparks flying across the office, perhaps literally. ®

Similar topics


Other stories you might like

  • Star loses $500,000 NFT after crooks exploit Rarible market
    This isn't the moving-fast-and-breaking-things future we wanted

    Miscreants exploited a now-fixed design flaw in the Rarible NFT marketplace to steal a non-fungible token from Taiwanese singer and actor Jay Chou and sell it for about $500,000.

    That's according to folks at Check Point, who on Thursday said the vulnerability could have been abused by crooks to gain full control of victims' marketplace accounts and the funds in them. Earlier this month, Chou said his NFT was stolen in what looked like a phishing attack.

    When researchers Roman Zaikin, Dikla Barda and Oded Vanunu investigated the security shortcoming they found that fraudsters could lure users to click on a link to malicious NFT, enabling them to take control of their marks' Rarible accounts using a standard called EIP-721.

    Continue reading
  • Intel’s neurochips could one day end up in PCs or a cloud service
    The brain-like chip technology could aid with low-power AI tasks like speech recognition

    You may have heard before about Intel's Loihi neuromorphic chips that mimic the way brains work, but what hasn't been clear yet is how the chipmaker will make money from the experimental silicon.

    In a recent roundtable with journalists, Intel Labs lead Rich Uhlig offered two possibilities: integrating Loihi in a CPU for PCs to perform energy-efficient AI tasks and potentially offering the its neuromorphic chips as a cloud service, although Uhlig was clear he wasn't firming actual product plans, just projecting what could theoretically happen in the future.

    "Right now with Loihi, we're at that point where we think we're onto something, but we don't actually have product plans yet. We're sort of earlier on in that work stream," he said last month.

    Continue reading
  • Cybercriminals do their homework for latest banking scam
    What could be safer than sending money to yourself through your own bank?

    A new social engineering scam is making the rounds, and this one is particularly insidious: It tricks users into sending money to what they think is their own account to reverse a fraudulent charge. 

    The FBI's Internet Crime Complaint Center issued the warning, which it said involves cybercriminals who have definitely done their homework. "In addition to knowing the victim's financial institution, the actors often had further information such as the victim's past addresses, social security number, and the last four digits of their bank accounts," the IC3 said. 

    The con starts off as many that target individuals do nowadays: With a text message. In this case it's not a phishing attempt, it's an attempt to ascertain whether the person receiving the message is susceptible to further manipulation. Posing as the target's bank, the message asks whether a large charge ($5,000 in the example the FBI gives) was legitimate and asks for a reply of YES or NO. Replying no leads to a follow-up text: "Our fraud specialist will be contacting you shortly. 

    Continue reading

Biting the hand that feeds IT © 1998–2022