Back to Social Engineering
    Social Engineering

    USB Drop Testing

    Controlled deployment of USB devices to test employee response to found media. USB drops exploit human curiosity to bypass perimeter security entirely, delivering malware directly to internal networks.

    What is USB Drop Testing?

    USB drop testing simulates a common real-world attack where malicious USB devices are left in locations where employees will find them. When connected to a computer, these devices can deliver malware, establish remote access, or exfiltrate data.

    Our ethical hacking approach uses harmless tracking beacons instead of actual malware. When an employee connects the device, we receive a notification with timing and network information. No harm is done, but we learn exactly how vulnerable your organization is.

    The human factor is central to this attack. Despite years of security awareness training, curiosity still drives many employees to plug in unknown devices. Testing reveals whether your training is actually working.

    Controlled USB device deployment
    Beacon tracking when devices are connected
    Connection location and timing analysis
    Payload simulation (no actual malware)
    Reporting behavior measurement
    Policy compliance assessment

    Why USB Drop Testing Matters

    Bypass Perimeter Security

    USB attacks bypass firewalls, email filtering, and network security entirely. The device goes directly to the internal network.

    Exploit Curiosity

    Human curiosity is a powerful motivator. Many employees will plug in a found device to see what's on it or find the owner.

    Test Policy Compliance

    Most organizations have policies against connecting unknown devices. Testing reveals if employees actually follow these rules.

    How Sectricity Approaches USB Drop Testing

    01

    Prepare devices

    USB devices are prepared with harmless tracking beacons that notify us when connected (no malware).

    02

    Place devices strategically

    We (or you) place the devices in realistic locations such as parking areas, lobbies, and common spaces.

    03

    Monitor connections

    We track which devices are found, how quickly they are connected, and from which network segments.

    04

    Analyze and report

    We report connection and reporting behavior, identify weak patterns, and recommend technical and training improvements.

    What You Get

    USB drop results provide clear metrics on employee behavior. You learn what percentage of dropped devices were connected, how quickly, and from which locations within your network.

    Reports include analysis of placement effectiveness, comparison of high-traffic vs. restricted areas, and recommendations for both technical controls and training improvements.

    Our ethical hacking methodology ensures all testing is safe. No actual malware is deployed, and all tracking is done with harmless beacons. We coordinate with your security team throughout the engagement.

    Deliverables

    • Connection rate by location
    • Time-to-connection analysis
    • Network segment identification
    • Reporting behavior assessment
    • Policy recommendations

    Frequently Asked Questions

    Test your USB security

    Discover if employees follow your media policies.