This Black Hat demo sheds light on how quickly an attacker can gain a foothold inside a network by luring victims with malicious “lost” USB drives.
Source: Threadpost