Fortaris Analyst Brief: Alert #1504 — Critical

Fortaris Analyst Brief: Alert #1504 — Critical

Fortaris Analyst Brief: Alert #1504 — Critical

A Flipper Zero BADUSB campaign was detected distributing a Windows login-screen backdoor that creates hidden administrator accounts and enables persistent, covert system access through the Sticky Keys exploit.

Threat Intelligence

Model Abuse

Dec 6, 2025

Fortaris has identified a high-risk attack campaign leveraging Flipper Zero BADUSB devices to deploy persistent Windows backdoors through automated keystroke injection.

This technique is being openly distributed across hacking forums and GitHub repositories, lowering the barrier for both insider threats and physical-access attacks. The campaign enables attackers to gain covert, long-term control of Windows systems without deploying traditional malware.

The result is a class of intrusion that bypasses antivirus, survives password changes, and remains active even after conventional remediation.

Automated Physical Access Attacks

The Flipper Zero is a consumer-grade hacking device capable of emulating a USB keyboard. When connected to a Windows system, it can execute thousands of keystrokes per second, allowing it to automate complex attack sequences in under a minute.

The malicious script detected by Fortaris performs the following actions:

It launches an elevated Command Prompt
It bypasses or auto-accepts UAC prompts
It replaces the Windows Sticky Keys binary (sethc.exe) with cmd.exe
It creates a hidden local administrator account

Once deployed, pressing Shift five times at the Windows login screen opens a SYSTEM-level command prompt, granting attackers full control of the machine before any user authentication occurs.

This creates a permanent backdoor that remains active across reboots, credential changes and malware removal.

Stealth Persistence Without Malware

Unlike traditional intrusions, this technique does not rely on installing trojans, exploits or malicious services.

It abuses legitimate Windows accessibility features and system binaries, meaning:

No malicious process needs to run
No exploit is required
No payload is written to disk
No antivirus signature is triggered

From a defender’s perspective, the system appears normal — yet it has been structurally compromised.

This represents a class of living-off-the-OS persistence, where attackers weaponise built-in functionality rather than deploying obvious malware.

Why This Attack Is Dangerous

This campaign turns brief physical access into full, permanent system compromise.

A laptop left unattended in an office, hotel, airport or conference can be compromised in seconds. A malicious insider, contractor or visitor can implant a backdoor that provides long-term administrative access without needing to return.

Once deployed, attackers can:

Access the system remotely
Create additional users
Disable security tools
Extract data
Move laterally across networks

All while bypassing standard detection controls.

Why Fortaris Flagged This

Fortaris classified this campaign as critical because it combines:

Open distribution of working attack scripts
A consumer-grade delivery device
Low technical skill requirements
High-impact system compromise
Persistent, stealthy access

This is not a theoretical vulnerability — it is a weaponised, deployable attack already circulating in the wild.

It reflects a broader shift toward hardware-assisted, automation-driven intrusions that bypass traditional cyber defences.

Defensive and Governance Implications

Organisations must treat physical access as a cyber threat vector.

In environments handling sensitive data, AI systems, or regulated infrastructure, this class of attack creates serious governance risk. A compromised endpoint may continue operating inside trusted networks without any visible sign of breach.

Security teams should prioritise:

Blocking unauthorised USB HID devices
Monitoring Windows accessibility binaries
Auditing hidden administrator accounts
Hardening physical endpoint access

Without these controls, organisations remain exposed to attacks that never trigger conventional alerts.

Final Thought

This detection highlights how modern attacks no longer rely on exploits — they rely on automation, accessibility and physical access.

The most dangerous intrusions today are not loud. They are fast, silent and structurally embedded.

That is the threat environment Fortaris is built to expose.

Turn AI Misuse Signals Intto Actionable Intelligence

Turn AI Misuse Signals Intto Actionable Intelligence

Turn AI Misuse Into Intelligence

Fortaris monitors public AI ecosystems to detect emerging misuse patterns, abuse vectors, and downstream risk before they escalate.

Fortaris tracks public AI ecosystems to identify emerging misuse and risk before it spreads.