Industrial cyberattackers are exploiting USBs to infiltrate OT networks and relying on old malware and vulnerabilities to achieve their goals, as seen in Honeywell's '2024 USB Threat Report'. USBs can bypass air gaps, a common security measure in high-risk industries, allowing attackers to breach networks. The rise of USB attacks during COVID is evident, with attackers opting for old tools like BlackEnergy and Industroyer, and targeting vulnerabilities like CVE-2010-2883 and CVE-2017-11882

Hackers use USBs old bugs & malware on OT systems

These attacks aim at disrupting OT systems, with around 80% capable of causing significant damage. Defending against USB threats requires strict policies and scanning measures, utilizing technology such as USB sanitation stations to prevent the entry of malicious devices into sensitive areas. ```
https://www.darkreading.com/ics-ot-security/to-damage-ot-systems-hackers-tap-usbs-old-bugs-and-malware