Back to Resources
Field Note January 2026 7 min read

Physical Drops: USB, Rubber Ducky, and Modern Descendants

Attackers leave infected USB devices at facility gates and in common areas, relying on social engineering and curiosity. We explain the evolving tactics and defenses.

C

Cascadia OT Security

Physical Security

M. HOLBROOKEMP · 00294OT · TIER 2READER · DOOR 14BPHYSICAL ACCESSTIER 2 CRED

Physical drops—devices left at facility gates, parking lots, and common areas—remain a surprisingly effective attack vector. A USB stick labeled "Salary Review" or "Bonus Information" will be plugged into a computer by someone. A charging cable that doubles as a data exfiltration device left in a restroom will be used by staff. Attackers exploit curiosity and the assumption that found items from inside the facility are safe.

Recent variants go beyond simple USB drives. We have observed sophisticated attacks using disguised charging cables, network adapters with hidden payloads, and even malicious micro-SD cards inserted into legitimate-looking accessories. The sophistication of the physical device is less important than the social engineering that drives its insertion.

Technical Capabilities and Payloads

Modern USB drop attacks can deliver keystroke injection (via devices that emulate keyboards), data exfiltration, credential harvesting, and network reconnaissance. Some devices are designed to auto-execute scripts when inserted, while others establish reverse shells that provide attackers persistent access. Rubber Ducky devices and similar tools can execute commands faster than a human operator, making them extremely effective against systems without behavioral monitoring.

The key advantage of physical devices is their ability to bypass perimeter defenses. A network-isolated workstation may be immune to internet-based attacks, but if a USB port is available and unrestricted, that isolation is compromised.

Detection and Prevention Tactics

Operational Discipline

Physical drops succeed because they exploit the assumption that anything physically inside a facility is legitimate. Changing that assumption requires sustained security culture and awareness. If you'd like to discuss physical security integration with cyber defense or USB hardening for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call