Skip to content

USB Killer Caused $58,000 in Damage to The College of Saint Rose

For the modern business a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d so much sensitive data, including personal, medical, and financial information–as well as intellectual property–is stored on college computers/servers. One would expect the diligence of IT administrators would be even more conspicuous.

Then there is the story that came out of the College of Saint Rose. It happened in New York’s capital city of Albany early in April 2019. An alumnus of the postgraduate school, Vishwanath Akuthota, was charged with, and pled guilty to, using what is known as a “USB killer”. He used it to fry the components of 59 Windows computers and seven Apple computers on campus. In all, it has cost the college $58,371 to replace the computers.

An Indian national in the United States on a student visa, Akuthota filmed himself destroying the machines on his iPhone. For his misdeeds, he faces as much as ten years in prison and a $250,000 fine.

What is USB Killer?

The “USB Killer” is a thumb drive that works by drawing power from the USB port to charge a capacitor in the USB. Then discharging the power into the USB port, frying essential components inside the machine. Thus, leaving it broken. The device itself is available online and is usually advertised as a tool meant to test a device’s surge protection.

Sabotage and Critical Mistakes

Every business wants to avoid situations like this. There isn’t much you can do against the “USB Killer”. However, there is plenty you can do to help you ward against employee-induced catastrophe. According to an independent study, in 2018 more than two-out-of-every-three data breaches were the result of employee negligence, direct employee theft, or straight sabotage.

You read that right. You have a better chance of being put behind the eight ball by your employees than you do by any other person. That’s not to say your employees are out to get you. Only about a quarter of data breaches were a result of a current or former employee’s deliberate action. However, you need to protect your network and computing infrastructure against situations in which there could be data loss triggered by your team.

How to Protect Your IT from Your Staff?

The first thing you should do is put together a strategy to snuff out potentially disastrous situations before they happen. That means training and monitoring. By training your staff on the best practices of using the systems they come into contact with, they’ll have a better understanding of how they work. Therefore, will likely make fewer egregious errors.

If they understand the systems and are versed in solid practices, some of them will want to take liberties. Liberties that they maybe wouldn’t have if they were less informed. This is why a thorough monitoring strategy is important. This strategy will work to keep your data and infrastructure safer. Additionally, it might just save you some time and money in lost productivity.

If your organization would like more information about how to train your staff properly, or how to sufficiently protect your network and infrastructure from all manners of threats, contact the IT pros at WheelHouse IT today at (877) 771-2384.

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.