Thumbsucking, similar to podslurping, is the intentional use of a portable USB mass storage device, such as a USB flash drive (or "thumbdrive"), to illicitly download confidential data from a network endpoint.4
A USB flash drive was allegedly used to remove highly classified documents about the design of U.S. nuclear weapons from a vault at Los Alamos without authorization.5
The threat of thumbsucking has been amplified for a number of reasons, including the following:
Techniques to investigate data theft include stochastic forensics, digital artifact analysis (especially of USB drive artifacts), and other computer forensics techniques.
Ian (2021-11-06). "The Data Theft You Never Hear About". Steadfast Solutions. Retrieved 2022-07-11. https://www.steadfastsolutions.com.au/insights/the-data-theft-you-never-hear-about/ ↩
Xing, Liudong; Levitin, Gregory (November 2017). "Balancing theft and corruption threats by data partition in cloud system with independent server protection". Reliability Engineering & System Safety. 167: 248–254. doi:10.1016/j.ress.2017.06.006. /wiki/Doi_(identifier) ↩
Schneier, Bruce (10 June 2013). "Government Secrets and the Need for Whistle-blowers". Schneier on Security. Retrieved 15 February 2015. /wiki/Bruce_Schneier ↩
"Do you know who is sucking data from your computer?". Archived from the original on August 19, 2007. Retrieved 15 February 2015. https://web.archive.org/web/20070819080552/http://www.thumbsuckingthreat.com/index.html ↩
Zagorin, Adam "A breach in nuclear security." Archived 2008-01-31 at the Wayback Machine Time, April 19, 2007. Retrieved April 21, 2007 http://rawstory.com/showoutarticle.php?src=http%3A%2F%2Fwww.time.com%2Ftime%2Fprintout%2F0%2C8816%2C1612912%2C00.html ↩