By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: What Is A USB ‘Rubber Ducky’? – BGR
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > What Is A USB ‘Rubber Ducky’? – BGR
News

What Is A USB ‘Rubber Ducky’? – BGR

News Room
Last updated: 2025/10/27 at 9:38 AM
News Room Published 27 October 2025
Share
SHARE




Who knew rubber duckies could have a sinister meaning? No, not yellow rubber duckies that float in the bathtub. The rubber ducky that you plug into a computer’s USB port, like a flash drive, that is designed to impersonate a keyboard. In reality, it houses what’s called a payload, or malicious code, that injects a keystroke attack. In other words, when you plug it into a USB port, it tricks the computer into thinking it’s a keyboard, but instead it delivers pre-programmed keystrokes to achieve a task, in seconds. This is called keystroke injection and it’s one way to hack modern devices. Before you know it, your computer or device is executing commands that you have no control over.

How is that even possible? A rubber ducky deploys code, loaded onto the USB drive, from a programming language called Ducky Script. When plugged in, the drive automatically executes the code, achieving whatever the attacker wanted to do. It can be any type of storage device, even repurposed old USB drives. It works because to a computer, a keyboard is inherently trusted — it’s a peripheral the computer automatically recognizes. The rubber ducky abuses that trust, like a vampire asking to enter your home, only the home is your computer. There is a silver lining. Rubber duckies are often used by ethical or white-hat-hackers, the “good guys,” like cybersecurity professionals and researchers learning how to defend against this kind of attack. Even so, that doesn’t mean a rubber ducky couldn’t be used for nefarious activities.

What can a USB rubber ducky do when plugged in?



New Africa/Shutterstock

It’s frightening to know you can plug in a regular-looking USB drive and suddenly your computer is taken over. That’s why cybersecurity experts say you should always avoid plugging in unknown devices, like if you find a USB drive laying around. If it’s a rubber ducky, loaded with malicious code, it could be used to bypass security and authentication, create remote access backdoors, steal data, modify connected networks, and alter your system by modifying registry keys or disabling firewalls.

Within seconds, the ducky code can open PowerShell — an administrative toolset — create a new administrative user with system-level access, and start causing damage, all without you noticing. As long as a ducky has that access, it can download more code, give hackers remote control, wipe hard drives, steal data, monitor you, and record keystrokes, the latter of which could be used to gain access to your online accounts. It’s scary stuff.

But it’s not something that occurs without the USB drive or storage device being physically plugged in first. It can also happen if you plug into a compromised public USB port, which is why you should avoid public USB charging ports altogether. That’s also why the TSA warns travelers about a dangerous iPhone setting that enables “juice jacking” via USB port. If you’re not plugging in, or into, unknown devices, the threat is minimal. Moreover, don’t give storage devices you use to strangers as they can load the drive with malicious code before giving it back.



Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Artificial intelligence: trust but verify?
Next Article From 50 Pages of Handwritten Notes to a Digital Manuscript with Python and AI | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Office equipment from former Zulily HQ in Seattle donated to Goodwill for use across facilities
Computing
Coding Video Games With A Prompt? It Might Be Possible With Gemini 3.0 – BGR
News
Depinsim Raises $8 Million in Strategic Funding, Opening the Era of Connection-as-Value
Gadget
Best phones to buy in 2025 reviewed and ranked | Stuff
Gadget

You Might also Like

News

Coding Video Games With A Prompt? It Might Be Possible With Gemini 3.0 – BGR

5 Min Read
News

Ultra-HD televisions not noticeably better for typical viewer, scientists say

5 Min Read
News

The last-gen Kindle is a steal at just $65 refurbished 

1 Min Read
News

If you hate Google Maps ads, Apple Maps might not be better for much longer

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?