So this is just a question that popped into my mind the other day, sorry if it doesn’t fit the community.

At the local pharmacy I noticed two USB ports on the back of the monitors they were using and I was thinking I could’ve easily gotten a RAT in there if I was more smart and malicious.

Similar places were banks or shops, sometimes ethernet ports as well.

Realistically, how dangerous is this? Thanks for any answers.

  • Blue_Morpho@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    1 month ago

    If it’s not an all in one PC, those USB ports on the back of the monitor aren’t likely to be connected to anything.

    I’ve never used the monitor USB ports because they require another USB cable to go back to the PC so the monitor can act as a hub. So it’s not saving much clutter and isn’t easily accessible like a desktop USB hub.

    Furthermore, if the IT department has any security, it will have USB completely disabled. My wife worked in HR for a regular consumer brand and even those laptops were so locked down such that you couldn’t plug in a different mouse without IT approval. You couldn’t even boot to Linux to bypass because the bios was locked and the drive was Bitlockered.

    • Agent641@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      1 month ago

      Can a locked BIOS still be bypassed by shorting the CMOS battery or am I antiquated? It’s been forever since I needed to do that.

      • sylver_dragon@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 month ago

        It depends on the system. Some enterprise systems have a BIOS which will survive a loss of battery power and don’t have a hardware reset process. Some Dell laptops were like this and you needed to contact Dell to do a BIOS reset. It’s been long enough that I have forgotten how that worked, but I’d assume it’s some sort of public/private key signing setup.