USBKill

USBKill Laptop and Tablet Test Results

USB-C and Lightning ports can require authentication mechanisms before providing power. These mechanisms thwart unpowered USB Power Surge Attacks. However, Standalone attacks do not require the power from the host device to work. The USBKill V4 Pro has a Standalone mode - and we are able to demonstrate that while some devices try to prevent an attack by not delivering power - they are not protected against Surge Attacks.
In our tests, every laptop with a USB-A ("old style") USB port failed either completely or partially.
Apple tablet and phone devices typically fail slowly - one to two days later - while Apple laptops fail instantly.

Product

Macbook Pro

Test Date

2020 October 15

Description

The Macbook Pro's popularity among developers makes it an obvious target for USB Power Surge Attacks. The Macbook Pro has been tested with the USBKill V3 and V4 across all models since 2015. When used with the USBKilll V4 Pro, the latest version, like previous versions, is vulnerable. See the full test video 🠖

  • Tested Model

    Macbook Pro 2015 - 2020

  • Tested With

    USBKill V4 Pro

  • Result

    Vulnerable


Product

iPad Pro

Test Date

2019 March 4

Description

With the inclusion of the Lightning port, iPad and iPhone devices required an authentication mechanism before the USB port delivered power. This meant that unpowered USB Power Surge Attacks were thwarted. All devices are vulnerable to powered USB Killed Surge attacks - and the iPad Pro is vulnerable to unpowered attacks. See the full test video 🠖

  • Tested Model

    iPad, iPad Pro

  • Tested With

    USBKill V4

  • Result

    Vulnerable