In this threat brief we will discuss the existence of embedded USB keyboards that are becoming increasingly common, these keyboard like devices can be used to bypass the security enhancements in modern operating systems or configuration settings that stop the automatic execution of code from USB devices. However these devices are being exploited and presented as keyboards and injecting keystrokes as a user would.
In this brief we will start by explaining the technology and the scale of usage of these devices before discussing the ways that these attacks can be detected and prevented.