<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/subhojit-roy/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/subhojit-roy</link><item><guid isPermaLink="false">9f7751cc-94f8-474f-89f3-f375557c0d7f</guid><link>https://www.ivanti.com/en-gb/blog/vulnerability-prioritization-guide</link><atom:author><atom:name>Subhojit Roy</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/subhojit-roy</atom:uri></atom:author><category>Security</category><title>Vulnerability Prioritisation: The Complete Guide</title><description>&lt;p&gt;With thousands of vulnerabilities discovered every year, not all pose the same risk. Some can cripple critical systems, while others have little real-world impact.&lt;/p&gt;

&lt;p&gt;The key is knowing which threats to act on first. Vulnerability prioritisation helps security teams cut through the noise, focus on what truly matters and build resilience against critical attacks.&lt;/p&gt;

&lt;h2&gt;What is vulnerability prioritisation?&lt;/h2&gt;

&lt;p&gt;Vulnerability prioritisation is the process of ranking vulnerabilities based on risk factors, such as exploitability, asset importance, threat intelligence and business impact.&lt;/p&gt;

&lt;p&gt;Rather than reacting to every alert, proper prioritisation allows organisations to focus on the vulnerabilities that pose the greatest danger to the business. Without prioritisation, security teams risk wasting time patching low-risk flaws while missing critical exposures that attackers could exploit. If done well, prioritisation enables smarter resource allocation, faster response to urgent threats and better alignment with compliance and business goals.&lt;/p&gt;

&lt;p&gt;When talking about vulnerability management, it’s helpful to separate detection from prioritisation: detection is the act of finding and listing vulnerabilities (often by using scanners or automated tools), while prioritisation is the process of deciding which of those vulnerabilities to fix first, based on factors such as risk, likelihood of exploitations, business context and asset value.&lt;/p&gt;

&lt;p&gt;In other words, detection is about making the list, and prioritisation is about sorting through it by urgency and impact.&lt;/p&gt;

&lt;h2&gt;What is risk-based vulnerability prioritisation?&lt;/h2&gt;

&lt;p&gt;Traditional methods of risk prioritisation often rely solely on CVSS scores. While helpful, severity ratings alone ignore context, treating all environments with the same and overlooking business-critical risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/use-cases/manage-it-vulnerability-risk"&gt;Risk-based prioritization&lt;/a&gt; shifts the focus to what truly matters by incorporating:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Asset criticality&lt;/li&gt;
	&lt;li&gt;Type of exploit and active threats&lt;/li&gt;
	&lt;li&gt;Business impact&lt;/li&gt;
	&lt;li&gt;Threat intelligence&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Combining these elements, risk-based prioritisation ensures your security team focuses on vulnerabilities that are both exploit-ready and business-critical, instead of scattering efforts across every scan finding (many of which might be low-risk).&lt;/p&gt;

&lt;p&gt;Without this approach, you risk patching low-impact test-server issues while overlooking high-impact, high-exploit vulnerabilities in your most critical assets. This method creates a triage process rooted in actual risk rather than just technical severity.&lt;/p&gt;

&lt;h3&gt;Advantages of risk-driven approaches&lt;/h3&gt;

&lt;p&gt;Adopting a &lt;a href="https://www.ivanti.com/blog/vulnerability-and-risk-management-how-to-simplify-the-process" target="_blank" rel="noopener"&gt;risk-based approach&lt;/a&gt; shift the focus from only recognising the severity of a vulnerability to addressing the factors the truly put your organisation at risk. Here’s why that matters:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reduced noise&lt;/strong&gt; — Eliminate alert fatigue by filtering out low-risk vulnerabilities that don’t require immediate action.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Faster remediation of critical issues&lt;/strong&gt; — Focus on your limited resources on the vulnerabilities most likely to be exploited.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Better alignment with business goals&lt;/strong&gt; — Prioritise what matters to your organisation, not just what is perceived as urgent.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved collaboration&lt;/strong&gt; — Security, IT and DevOps teams can work from a shared understanding of what’s most important.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Risk-based vs. traditional prioritisation models&lt;/h3&gt;

&lt;p&gt;Below is a quick reference table to help you understand how risk-based vulnerability prioritisation contrasts with traditional approaches.&lt;/p&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Traditional approach&lt;/h4&gt;
			&lt;/th&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Risk-based approach&lt;/h4&gt;
			&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Based mostly on CVSS scores.&lt;/td&gt;
			&lt;td&gt;Incorporates exploitability, asset value and threats.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Treats all high CVSS scores equally.&lt;/td&gt;
			&lt;td&gt;Recognises that not all "high" CVEs are high risk.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Generic, one-size-fits-all.&lt;/td&gt;
			&lt;td&gt;Tailored to your specific environment.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Often leads to patching low-impact vulnerabilities.&lt;/td&gt;
			&lt;td&gt;Focuses on what truly affects your business.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h4&gt;How to prioritise vulnerabilities&lt;/h4&gt;

&lt;p&gt;Identifying vulnerabilities is only the beginning. With thousands of possible issues across networks and applications, knowing &lt;strong&gt;what to fix first&lt;/strong&gt; is essential. Modern prioritisation considers:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Asset criticality:&lt;/strong&gt; Not all assets are equal. A flaw in a public-facing portal handling sensitive data is far riskier than one on a test server. Classifying assets by business value helps direct attention to where it counts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Exploitability and threat intel:&lt;/strong&gt; A vulnerability isn’t always a threat — unless attackers are actively exploiting it. Prioritise issues on the CISA KEV list, including ransomware kits, or with public exploits first.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Severity (CVSS):&lt;/strong&gt; CVSS provides a baseline but should not be the only factor. High scores without exploitation may be less urgent, while medium scores with active threats may require faster action.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://vulners.com/blog/cvss-common-vulnerability-scoring-system/" rel="noopener" target="_blank"&gt;Common Vulnerability Scoring System (CVSS)&lt;/a&gt; provides a standardised way to assess the severity of a vulnerability (typically on a scale of &lt;strong&gt;0.0 to 10.0&lt;/strong&gt;):&lt;/p&gt;

&lt;p&gt;&lt;img alt="CVSS v3.0 Ratings chart with four categories: Low (0.1 - 3.9), Medium (4.0 - 6.9), High (7.0 - 8.9), and Critical (9.0 - 10.0), each in a colored box under the header &amp;quot;CVSS v3.0 RATINGS" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/183214-vulnerability-prioritization_b.jpg"&gt;&lt;u&gt;Why it matters:&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;CVSS helps &lt;a href="https://www.ivanti.com/en-gb/blog/common-vulnerability-scoring-system-cvss"&gt;establish a baseline&lt;/a&gt;, especially in large-scale scanning. However, severity scores alone don’t take into account business or environmental context, so they shouldn’t be the &lt;em&gt;only&lt;/em&gt; factor.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Best practices for effective vulnerability prioritisation&lt;/h2&gt;

&lt;p&gt;Prioritisation shouldn’t be an afterthought. You should build it into every stage of your vulnerability management process.&lt;/p&gt;

&lt;p&gt;From the moment vulnerabilities are discovered, you should evaluate them based on the risk factors mentioned above to ensure remediation aligns with your organisation’s threat landscape and operational priorities. Integrating prioritisation early also helps reduce bottlenecks and streamline remediation workflows.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Integrate into the VM lifecycle:&lt;/strong&gt; Evaluate vulnerabilities by risk from the moment they’re discovered.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Leverage automation:&lt;/strong&gt; Tools like Ivanti Neurons for RBVM combine CVSS, threat intel and asset context to automatically assign risk scores.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Continuously monitor:&lt;/strong&gt; Threats evolve; a low-risk flaw today could become critical tomorrow. Regularly refresh threat feeds and reassess priorities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Foster collaboration:&lt;/strong&gt; Security brings risk context; IT provides operational insight. Working together ensures prioritisation is both effective and realistic.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Manual prioritisation is unsustainable at scale. To handle large volumes of vulnerabilities, organisations should leverage tools like &lt;a href="https://www.ivanti.com/en-gb/products/risk-based-vulnerability-management"&gt;Ivanti Neurons for RBVM&lt;/a&gt; and &lt;a href="https://www.ivanti.com/en-gb/exposure-management"&gt;Ivanti’s Exposure Management solutions&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;These platforms combine threat intelligence, CVSS scores, asset context, and business impact to automatically assign risk scores and suggest prioritisation. Automation not only saves time but also improves accuracy and consistency, helping security teams respond to critical threats faster.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Flowchart displaying vulnerability assessment steps: &amp;quot;Vulnerability detected&amp;quot; leads to four actions—assess CVSS score, evaluate exploitability, determine asset value, consider business impact—which all connect to &amp;quot;Assign overall risk score." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/183214-vulnerability-prioritization_c.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Vulnerability prioritisation matrix: Make more strategic decisions&lt;/h2&gt;

&lt;p&gt;With security teams overwhelmed by thousands of vulnerabilities, effective prioritisation isn't a luxury — it's a necessity. One of the most straightforward visual tools for helping teams decide what to fix first is the vulnerability prioritisation matrix.&lt;/p&gt;

&lt;h3&gt;What is a vulnerability prioritisation matrix?&lt;/h3&gt;

&lt;p&gt;A vulnerability prioritisation matrix is a visual decision-making framework that helps security teams rank vulnerabilities based on multiple risk factors (typically likelihood and impact).&lt;/p&gt;

&lt;p&gt;&lt;img alt="Priority matrix for risk management with axes labeled high/low likelihood and high/low impact; top priority is in the high likelihood, high impact quadrant, medium priority is in the high likelihood, low impact and low likelihood, high impact quadrants, and low priority is in the low likelihood, low impact quadrant." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/183214-vulnerability-prioritization_d.jpg"&gt;It plots vulnerabilities on a grid or heatmap, helping teams see at a glance:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Which vulnerabilities pose the &lt;strong&gt;highest risk&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;Which vulnerabilities can be &lt;strong&gt;deferred or monitored&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;How to &lt;strong&gt;allocate remediation resources&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Think of it as a risk lens that turns raw vulnerability data into actionable insights.&lt;/p&gt;

&lt;h3&gt;When to use a prioritisation matrix&lt;/h3&gt;

&lt;p&gt;A vulnerability matrix is especially helpful when:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You have limited resources and need to justify what to patch first.&lt;/li&gt;
	&lt;li&gt;You're dealing with competing priorities across teams.&lt;/li&gt;
	&lt;li&gt;You need a clear, communicable visual for non-technical stakeholders.&lt;/li&gt;
	&lt;li&gt;You're building a case for &lt;a href="https://www.ivanti.com/en-gb/blog/how-to-implement-quantitative-risk-assessment"&gt;risk acceptance vs. mitigation&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s a great tool for quarterly risk reviews, incident response planning, or as part of a risk-based vulnerability management (RBVM) programme.&lt;/p&gt;

&lt;h2&gt;Prioritise vulnerabilities for resilience against critical threats&lt;/h2&gt;

&lt;p&gt;Vulnerability prioritisation transforms endless scanning results into a clear, actionable roadmap. By going beyond severity scores to include exploitability, business impact and environmental context, organisations can focus on the vulnerabilities that truly matter. With risk-based approaches, visual tools like matrices, automation and cross-team collaboration, security teams move from reactive patching to proactive, risk-informed prevention.&lt;/p&gt;

&lt;p&gt;In today’s threat landscape, simply detecting vulnerabilities versus prioritising them effectively can mean the difference between resilience and compromise.&lt;/p&gt;
</description><pubDate>Thu, 30 Oct 2025 15:28:29 Z</pubDate></item><item><guid isPermaLink="false">d89f1b6c-cee7-43cc-a328-f057a5b008d2</guid><link>https://www.ivanti.com/en-gb/blog/what-is-badusb</link><atom:author><atom:name>Subhojit Roy</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/subhojit-roy</atom:uri></atom:author><category>Endpoint &amp; Workspace Management</category><category>Security</category><title>What Is a BadUSB? Understand the Threat and How to Prevent It</title><description>&lt;p&gt;Lurking beneath the convenience and everyday nature of USB devices is a sophisticated cybersecurity threat known as BadUSB.&lt;/p&gt;

&lt;p&gt;BadUSB is a type of attack that leverages the reprogrammable firmware in USB devices (e.g., flash drives, keyboards, charging cables) to carry out malicious actions. Unlike traditional malware, which lives in the file system and can often be detected by antivirus tools, BadUSB lives in the firmware layer.&lt;/p&gt;

&lt;p&gt;Here’s why security professionals consider BadUSB attacks a growing threat:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Plug-and-play nature — Users often trust USB devices implicitly, plugging in unknown or giveaway drives without a second thought.&lt;/li&gt;
	&lt;li&gt;Mass exploitation potential — Cybercriminals can distribute compromised USBs at events, in mail or even leave them in public places for victims to find and use.&lt;/li&gt;
	&lt;li&gt;Difficult to detect — Since the malware is embedded in the USB’s firmware, it bypasses most traditional antivirus and endpoint protection tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once connected to a computer, a BadUSB device can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Emulate a keyboard to type malicious commands.&lt;/li&gt;
	&lt;li&gt;Instal back doors or keyloggers.&lt;/li&gt;
	&lt;li&gt;Redirect internet traffic.&lt;/li&gt;
	&lt;li&gt;Exfiltrate sensitive data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;nbsp;&lt;img alt="examples of bad types of USB" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/169370-inline_devices_a.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;How BadUSB attacks work&lt;/h2&gt;

&lt;p&gt;BadUSB gained public attention in 2014 when researchers Karsten Nohl and Jakob Lell demonstrated at Black Hat USA that USB firmware could be reprogrammed for malicious use — undetectable by operating systems. They also revealed that most USB controllers lacked firmware authenticity checks, a vulnerability likely exploited by intelligence agencies like the NSA long before the public disclosure.&lt;/p&gt;

&lt;p&gt;Since BadUSB attacks manipulate a USB device’s firmware (the low-level code that controls how the device communicates with your system), understanding how a BadUSB attack unfolds is key to recognising its severity and enacting safeguards.&lt;/p&gt;

&lt;p&gt;Below are three crucial aspects of BadUSB attacks to familiarise yourself with so you can eliminate this potential vulnerability:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reprogramming USB firmware&lt;/li&gt;
	&lt;li&gt;Masquerading as trusted devices&lt;/li&gt;
	&lt;li&gt;The timeline of a BadUSB attack&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Reprogramming firmware to turn USB devices into cyber weapons&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The ability to reprogram the firmware on USB devices (such as flash drives, keyboards, mice or network adapters) is at the heart of a BadUSB attack. Many USB controllers, especially older or inexpensive ones, allow people to rewrite their firmware without any authentication or digital signature checks.&lt;/p&gt;

&lt;p&gt;Once compromised, the USB device no longer behaves as its label suggests. Instead, it becomes a covert cyber weapon. Because firmware operates below the operating system level, traditional security tools cannot scan or detect these alterations.&lt;/p&gt;

&lt;h3&gt;Masquerading as trusted devices to avoid detection&lt;/h3&gt;

&lt;p&gt;One of the most dangerous aspects of BadUSB is device impersonation. Here are two of the most common disguises:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Keyboard emulation — A USB flash drive can be used as a keyboard (a trusted device type), then inject keystrokes that launch PowerShell or Command Prompt to download and execute malware — just as if a user were typing the commands manually.&lt;/li&gt;
	&lt;li&gt;Network adapter spoofing — The USB can pretend to be a network interface controller (NIC). Once connected, it can reroute your internet traffic through a malicious server, perform man-in-the-middle (MITM) attacks or intercept sensitive data, like login credentials.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Timeline of a BadUSB attack: From plug-in to payload&lt;/h3&gt;

&lt;p&gt;Here’s a simplified timeline of how a BadUSB attack can unfold:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Device insertion (0 seconds) — The user inserts the malicious USB device into their computer, expecting it to be a harmless flash drive, charging cable, etc.&lt;/li&gt;
	&lt;li&gt;Enumeration (0–2 seconds) — The device introduces itself to the operating system; not as a flash drive, but as a keyboard or network card.&lt;/li&gt;
	&lt;li&gt;Payload Execution (2–5 seconds) — When emulating a keyboard, the device begins typing commands silently in the background. When emulating a network adapter, it reconfigures the system’s DNS or routes traffic through a malicious proxy.&lt;/li&gt;
	&lt;li&gt;Post-Exploitation (5 seconds and beyond) — Depending on the attack goal, the device may:
	&lt;ul&gt;
		&lt;li&gt;Download and instal back doors.&lt;/li&gt;
		&lt;li&gt;Steal files or login credentials.&lt;/li&gt;
		&lt;li&gt;Grant remote access to an attacker.&lt;/li&gt;
		&lt;li&gt;Spread across the internal network.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because this all happens within seconds, and without any antivirus alert or user prompt, a BadUSB attack can compromise a system before the user even realises what happened.&lt;/p&gt;

&lt;h2&gt;Real-World BadUSB attack techniques&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;From Pavement to Breach: How a Forgotten USB Could Cripple a Government Network&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;u&gt;What happened&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;Researchers conducted experiments by deliberately dropping USB drives in public areas, such as parking lots, university campuses and conference rooms to observe user behaviour. According to &lt;a href="https://www.gdatasoftware.com/blog/2021/11/usb-drives-still-a-danger" rel="noopener" target="_blank"&gt;G DATA&lt;/a&gt;, an overwhelming 98% of these abandoned drives were picked up and at least 45% were plugged into computers to inspect their contents.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Similarly, a study by &lt;a href="https://elie.net/blog/security/concerns-about-usb-security-are-real-48-percent-of-people-do-plug-in-usb-drives-found-in-parking-lots" rel="noopener" target="_blank"&gt;Elie Bursztein&lt;/a&gt; and his team found that 48% of people who discovered a USB drive — regardless of the location — went on to plug it in. These findings highlight the significant risk posed by seemingly innocuous USB devices, driven largely by human curiosity or helpful intent.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;What made it a BadUSB scenario&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;The USBs were crafted as malicious HID (Human Interface Device) implants (i.e., they weren’t carrying malware files but emulated keyboards that auto-typed attack commands once connected). They exploit user trust: no scanning by antivirus or clicking was required—the act of plugging the device in was enough to trigger the attack.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Key industry lessons from the study&lt;/u&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Social engineering is still incredibly effective&lt;/strong&gt;

	&lt;ul&gt;
		&lt;li&gt;The studies confirmed that attackers don’t need advanced zero-day exploits when they can rely on human psychology. Curiosity, helpfulness, or even the assumption of lost property can be weaponized.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Traditional security measures aren’t enough&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;Most endpoint protection tools scan for malware, but BadUSB attacks use keyboard emulation, bypassing antivirus and software-based defences entirely. This showed a critical blind spot in endpoint security.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Air-gapped systems are not immune&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;The fact that some USBs were plugged into secure or air-gapped environments was especially concerning. It shattered the illusion that physically isolated systems are inherently safe, and highlighted the importance of physical security and insider awareness.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Need for stronger device control policies&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;These results pushed many organisations to re-evaluate their USB and removable media policies. Tools like Ivanti Device Control became more relevant, offering the ability to allow, block, or restrict specific device classes.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Emphasis on user awareness and training&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;The studies reinforced the necessity of employee education. Users must be trained to treat unknown devices as potential threats and understand that “plugging in to help” could lead to catastrophic outcomes.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Policy meets technology&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;The takeaway wasn’t just technological. It prompted organisations to develop clear security policies around removable media, improve logging, and enforce stricter controls for physical access.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Rubber ducky attacks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ijert.org/unveiling-the-power-of-usb-rubber-ducky-an-analysis-of-its-hardware-capabilities" rel="noopener" target="_blank"&gt;Rubber ducky attacks&lt;/a&gt; refer to a type of cyberattack where an attacker uses a malicious USB device, often disguised as a harmless USB flash drive (called a rubber ducky), to compromise a computer system.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Key points about rubber ducky attacks&lt;/u&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Device type&lt;/strong&gt; – Looks like a standard USB drive but functions as a Human Interface Device (HID), like a keyboard.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Working principle&lt;/strong&gt; – When plugged in, the Rubber Ducky emulates a keyboard and rapidly types pre-programmed keystrokes to execute commands on the target system.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Payloads&lt;/strong&gt; – These could include:
	&lt;ul&gt;
		&lt;li&gt;Opening a command prompt and downloading malware&lt;/li&gt;
		&lt;li&gt;Creating new user accounts&lt;/li&gt;
		&lt;li&gt;Disabling security features&lt;/li&gt;
		&lt;li&gt;Exfiltrating data&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Speed&lt;/strong&gt; – Executes commands far faster than a human could type, usually completing an attack in seconds.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;No authentication required&lt;/strong&gt; – Most systems automatically trust HID devices without user authorization.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;u&gt;Common mitigation measures&lt;/u&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Implement workstation lock policies when unattended.&lt;/li&gt;
	&lt;li&gt;Apply the principle of least privilege—prevent users from having local admin rights.&lt;/li&gt;
	&lt;li&gt;Educate employees on not leaving workstations unlocked and the risks of unknown USB devices.&lt;/li&gt;
	&lt;li&gt;Physical security (USB port locks, CCTV, and awareness).&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Why traditional security solutions don’t detect BadUSB attacks&lt;/h2&gt;

&lt;p&gt;Despite the &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank" rel="noopener"&gt;ever-evolving cybersecurity landscape&lt;/a&gt;, BadUSB remains a stealthy and largely undetectable threat. Most traditional security solutions are simply not designed to monitor what happens at the firmware level of USB devices.&lt;/p&gt;

&lt;h3&gt;USB whitelisting limitations&lt;/h3&gt;

&lt;p&gt;Some organisations implement USB whitelisting, allowing only approved devices to connect to corporate systems. While this is a solid first step, it doesn’t protect against devices that masquerade as something they’re not doing.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A whitelisted USB flash drive could be reprogrammed to behave like a keyboard.&lt;/li&gt;
	&lt;li&gt;USB devices with dynamic identities can bypass static whitelists by switching their declared class mid-connection.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Since the operating system identifies devices based on what they say they are — not what they contain — a malicious device can trick even well-maintained whitelists.&lt;/p&gt;

&lt;h3&gt;Firmware-level reprogramming vs. traditional malware&lt;/h3&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Feature&lt;/h4&gt;
			&lt;/th&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Firmware-Level Reprogramming (e.g., BadUSB)&lt;/h4&gt;
			&lt;/th&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Traditional Malware&lt;/h4&gt;
			&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Operating level&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Operates at the firmware level (below the OS). Modifies device firmware (e.g., USB controller firmware).&lt;/td&gt;
			&lt;td&gt;Operates at the software level within the OS.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Location&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Lives outside the file system.&lt;/td&gt;
			&lt;td&gt;Resides within files, processes, or other OS components.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Detection&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Cannot be detected by software-based scanners (antivirus, EDR). Rarely (if ever) validated by traditional monitoring systems.&lt;/td&gt;
			&lt;td&gt;Detectable by antivirus programmes and EDR tools (scanning files, processes, network traffic, known signatures/behaviours).&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Payload requirement&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Does not require a stored payload.&lt;/td&gt;
			&lt;td&gt;Typically relies on stored payloads (malicious files).&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Digital footprint&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Performs attacks without leaving a digital footprint in traditional monitoring systems.&lt;/td&gt;
			&lt;td&gt;Often leaves a digital footprint that can be traced by security tools.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Trust exploited&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Exploits the fundamental trust computers place in hardware devices (e.g., USB devices).&lt;/td&gt;
			&lt;td&gt;Exploits software vulnerabilities, user actions, or misconfigurations.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Defence&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Requires hardware-aware policies, physical port control, and user education.&lt;/td&gt;
			&lt;td&gt;Relies on software defences like antivirus, EDR, firewalls, and patching.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;BadUSB attack prevention: Best practices&lt;/h2&gt;

&lt;p&gt;As BadUSB attacks continue to bypass traditional security tools, organisations must shift toward proactive, layered defence strategies. Fortunately, there are effective prevention methods that can minimise or eliminate risks, including:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Policy-based USB access control&lt;/li&gt;
	&lt;li&gt;Blocking unused USB ports&lt;/li&gt;
	&lt;li&gt;Keystroke behaviour monitoring&lt;/li&gt;
	&lt;li&gt;Restricting access to elevated command prompt or PowerShell&lt;/li&gt;
	&lt;li&gt;Application control&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;1. Policy-based USB access control&lt;/h3&gt;

&lt;p&gt;The first line of defence is to establish strict, policy-driven USB access across your organisation. This means defining exactly which devices can connect to which systems and blocking all others.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Key strategies include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Blocking USB device classes that should never be used, such as HID (keyboard/mouse) on servers or point-of-sale systems.&lt;/li&gt;
	&lt;li&gt;Applying role-based restrictions to ensure that only authorised employees can use removable media.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By implementing these policies through centralised management, organisations can effectively prevent unknown threats. For businesses that require scalable, enterprise-level protection, device control solutions such as Ivanti Endpoint Manager (EPM) and Ivanti Device and Application Control (IDAC) offer robust security and management capabilities.&lt;/p&gt;

&lt;h3&gt;2. Block unused USB ports to eliminate attack entry points&lt;/h3&gt;

&lt;p&gt;One of the simplest yet most effective strategies to prevent BadUSB attacks is to &lt;strong&gt;physically or logically disable unused USB ports&lt;/strong&gt;. If a port isn’t needed for business-critical functions, you should deactivate it to: Reduces the attack surface by limiting opportunities for unauthorised devices to connect.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Prevents users from accidentally (or intentionally) plugging in malicious USB devices.&lt;/li&gt;
	&lt;li&gt;Supports compliance with security frameworks that require strict endpoint control.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To implement this security protocol:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Use BIOS/UEFI settings to disable USB ports at the hardware level.&lt;/li&gt;
	&lt;li&gt;Leverage endpoint management tools (like &lt;a href="https://www.ivanti.com/en-gb/products/endpoint-manager"&gt;Ivanti EPM&lt;/a&gt;) to block USB ports through policy.&lt;/li&gt;
	&lt;li&gt;Apply physical port blockers for high-security environments where tamper-proofing is essential.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By eliminating open and unmonitored USB ports, you can dramatically reduce the risk of drive-by BadUSB infections and maintain tighter control over endpoint security for your entire organisation.&lt;/p&gt;

&lt;h3&gt;3. Detecting BadUSB with keystroke behaviour&lt;/h3&gt;

&lt;p&gt;BadUSB attacks often use HID (Human Interface Device) spoofing to inject commands via simulated keyboard inputs. These keystrokes happen at inhuman speeds — far beyond what any human user could produce.&lt;/p&gt;

&lt;p&gt;For example, a malicious USB might type a full PowerShell command in less than a second after being plugged in. By monitoring typing speed, timing patterns and command structures, security software can flag and respond to suspicious input activity before damage occurs.&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Even so, one of the major disadvantages of keystroke behaviour monitoring is that skilled attackers can slow down payload delivery to mimic human typing speeds and potentially evade detection.&lt;/p&gt;

&lt;h3&gt;4. Restrict access to elevated command prompt or PowerShell&lt;/h3&gt;

&lt;p&gt;BadUSB devices are dangerous not just because they connect to a system, but because they execute high-privilege commands almost instantly. One of the most common tactics is launching an elevated command prompt or PowerShell window to run malicious scripts, download payloads, or modify system settings.&lt;/p&gt;

&lt;p&gt;By restricting access to administrative command-line tools, you can effectively neutralise the payload execution stage of many BadUSB attacks — even if the device successfully connects.&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Implementing Just-in-Time (JIT) Privileged Access for command prompt and PowerShell is an excellent way to minimise attack windows while still allowing necessary administrative activity.&lt;/p&gt;

&lt;h3&gt;5. Deploy application control to mitigate BadUSB risks&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/products/application-control"&gt;Application control&lt;/a&gt; is a security approach that only allows approved and verified applications to be executed within a system or network. Instead of trying to identify and block bad behaviour, it whitelists only known good behaviour.&lt;/p&gt;

&lt;p&gt;More specifically, application control helps you:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Block unauthorised executables — BadUSB attacks often try to launch scripts or applications upon connection. Application control ensures that only whitelisted executables are allowed to run, immediately halting the attack before it can escalate.&lt;/li&gt;
	&lt;li&gt;Prevent unauthorised code execution — If a BadUSB device tries to emulate a keyboard and inject keystrokes to open PowerShell or command prompt, application control can prevent these programmes from executing (unless they are specifically allowed).&lt;/li&gt;
	&lt;li&gt;Implement hardware-aware policies — Some advanced application control solutions can implement device-specific policies (e.g., blocking all keyboard-like inputs from unknown USB vendors, restricting USB ports to charge-only functionality).&lt;/li&gt;
	&lt;li&gt;Reduce attack surfaces — By strictly controlling what software is allowed, even if a Bad USB bypasses physical protections, its ability to interact with the system is extremely limited.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;How Ivanti Endpoint Management and Ivanti Device Application Control help prevent BadUSB attacks&lt;/h2&gt;

&lt;p&gt;Grant temporary (just-in-time) access to the USB devices only when necessary. Initially, a complete block — such as targeting tools like the flipper device — was considered. However, after evaluating feasibility and business impact, this approach was determined to be too restrictive.&lt;/p&gt;

&lt;p&gt;Instead, &lt;a href="https://www.ivanti.com/en-gb/use-cases/endpoint-application-control"&gt;Ivanti Endpoint Management and Device Application Control&lt;/a&gt; provide a more flexible solution. They help mitigate BadUSB threats by allowing controlled device access and applying the right security policies. This approach balances protection with productivity, reducing risk without hindering legitimate use.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/169370-inline_devices_b.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Conclusion: Why BadUSB Awareness Matters&lt;/h2&gt;

&lt;p&gt;As cyber threats continue to get more sophisticated, awareness is your strongest first line of defence. BadUSB attacks represent a unique and underestimated vulnerability — one that bypasses traditional defences by exploiting the inherent trust most people place in USB devices. Without awareness and proactive control, even the most secure networks can fall victim to a single compromised USB device.&lt;/p&gt;

&lt;p&gt;Unfortunately, most organisations don’t fully monitor or control how these devices are used, leaving a massive blind spot in their security infrastructure. Implementing a clear USB security policy — along with the right tools to enforce it — is no longer optional. It’s essential.&lt;/p&gt;

&lt;h3&gt;Trust Ivanti for BadUSB attack prevention and superior device control&lt;/h3&gt;

&lt;p&gt;Organisations serious about mitigating USB-based threats should consider leveraging comprehensive device control solutions like &lt;a href="https://www.ivanti.com/en-gb/products/endpoint-manager"&gt;Ivanti Endpoint Manager (EPM)&lt;/a&gt; and &lt;a href="https://www.ivanti.com/en-gb/products/device-control"&gt;Ivanti Device Application Control (IDAC)&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Ivanti’s solution addresses all the key application controls recommended to defend against threats like BadUSB offering granular USB access controls to block or allow specific device types, real-time monitoring and reporting of USB activity across all endpoints, and automated policy enforcement that ensures compliance across departments and regions. These capabilities integrate seamlessly with broader endpoint protection strategies, preventing unauthorised devices from ever reaching sensitive systems. But Ivanti goes beyond these foundational controls with context-aware policy enforcement, allowing organisations to dynamically adjust USB access based on real-time risk signals such as user behaviour, location, and device trust — providing intelligent, adaptive protection in an ever-evolving threat landscape.&lt;/p&gt;

&lt;p&gt;BadUSB is not science fiction—it’s already happening. Educating your team, enforcing USB access policies, and leveraging tools like Ivanti can mean the difference between resilience and breach. Don’t wait for a compromised device to remind you of the risks. Take control now.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 29 Jul 2025 19:43:10 Z</pubDate></item></channel></rss>