Port 22

USB Devices the Common Denominator in All Attacks on Air-Gapped Systems

A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there.