Once connected, it can be used to carry out any operation on the target computer.
The devices can simply begin typing and clicking.
They called the attack BadUSB.
The method developed was much more sophisticated compared to USBdriveby.
However, they did not release thesource code until September.
source: www.techworm.net