These USBs did not contain auto-executing malware but instead relied on a social approach. An
individual would have to pick up the USB, plug it in, then make the decision to read a file and then run a program. The message contained within the file and the steps required to run the program should have been sufficient to make an individual suspicious and wary. If activated, the USB was designed to ‘phone home’ telling us where it was and sending some basic network information.