Adam Savage warns that malicious USB cables bypass standard security settings

Adam Savage’s Tested////3 min read

The humble USB drive is no longer just a storage device; it is a potential digital landmine. Adam Savage, legendary maker and former MythBuster, has long maintained a strict "zero trust" policy toward hardware handed to him at conventions. While many fans offer USB drives with genuine intent to share their work, the inherent risk of the hardware itself makes plugging them in a gamble that no professional should take. Modern malicious hardware has evolved far beyond simple infected files to include devices that can physically manipulate a computer's most basic input systems.

Why standard USB blocks fail against malicious devices

Most users believe they can protect themselves by disabling USB mass storage in their OS settings. However, the most sophisticated threats, such as those demonstrated by the security experts at ThreatLocker, don't identify as storage at all. They present themselves as human interface devices, specifically keyboards. When a computer detects a new "keyboard," it typically grants it immediate permission to send keystrokes without user intervention. This allows the device to open a terminal, execute a PowerShell script, and begin exfiltrating data to Google Cloud or other legitimate services in seconds, effectively bypassing antivirus and endpoint detection.

Adam Savage warns that malicious USB cables bypass standard security settings
Why Adam Savage Won't Trust USB Keys

The hidden mini-computers inside charging cables

The threat landscape has shrunk to an alarming degree. Security experts revealed that even a standard-looking charging cable can house a mini-computer capable of running Linux and hosting a Wi-Fi chip. These devices can be programmed remotely or used as a physical bridge to intercept data. Because these peripherals are designed for convenience, they exploit the machine's inherent desire to be user-friendly. Once the connection is established, an attacker can take periodic screenshots, record every keystroke, or use built-in Windows tools like curl to upload sensitive documents to a remote server.

Moving toward a zero-trust hardware environment

To combat these invisible threats, security experts advocate for a Zero Trust Security model. This doesn't just mean not plugging in random drives; it means limiting the permissions of every piece of software on your machine. By blocking built-in tools like command prompts and PowerShell from accessing the internet unless specifically required for a job, you create a "crash barrier." Even if a malicious device successfully executes a script, it won't have the permissions necessary to phone home or access your private directories. In the hardware world, the rule is simple: if you didn't buy the cable or drive yourself, it doesn't touch your motherboard.

Topic DensityMention share of the most discussed topics · 9 mentions across 9 distinct topics
Adam Savage
11%· people
curl
11%· products
Google Cloud
11%· companies
Linux
11%· products
PowerShell
11%· products
Other topics
44%
End of Article
Source video
Adam Savage warns that malicious USB cables bypass standard security settings

Why Adam Savage Won't Trust USB Keys

Watch

Adam Savage’s Tested // 17:36

Adam Savage’s Tested is a content platform and community playground for makers and curious minds. On Tested.com, the highly- engaged Tested YouTube channel, and at conventions and events, dynamic makers share ideas and inspire each other to build their obsessions. Led by Adam Savage, the Tested team explores the intersection of science, popular culture, and emerging technology, showing how we are all makers. Adam also takes viewers behind the scenes of films, TV shows, theater, and museums, shining a spotlight on the craftspeople and artists who make the magic we all enjoy. Tested is also: Norman Chan, Joey Fameli, Josh Self, Kristen Lomasney and Thomas Crenshaw.

Who and what they mention most
3 min read0%
3 min read