| International Journal of Computer Applications |
| Foundation of Computer Science (FCS), NY, USA |
| Volume 187 - Number 56 |
| Year of Publication: 2025 |
| Authors: Allan Munyira, Carrol Donna Kudaro, Collins Katende, Hamuza Senyonga |
10.5120/ijca2025925974
|
Allan Munyira, Carrol Donna Kudaro, Collins Katende, Hamuza Senyonga . Exploiting the Human Element: A Multivector Study on USB Attacks, AI-Driven Phishing, and Metadata-based Surveillance. International Journal of Computer Applications. 187, 56 ( Nov 2025), 29-44. DOI=10.5120/ijca2025925974
Cybersecurity violations continue to grow not only because of technical weaknesses but also because of the consistent exploitation of the human factor. This study analyses how the modern adversary abuses the human factor through three coming attack vectors, USB-based exploits, AI-driven phishing and metadata-based surveillance, to execute synchronized multivector campaigns. The study uses a synthesis of secondary data, empirical literature and a large scale simulation comprising 10,000 trials to construct a hypothetical financial institution (ABC Bank) to measure the individual and combined effect of these attack modalities on system resilience. Findings indicate that phishing is the most common vector, with approximately 63 per cent of successful attacks, but USB-based physical attacks, even though less common, significantly increase the likelihood of success when used together with social and informational vectors. Metadata profiling becomes a facilitator of pinpointing and refined targeting, thus boosting the authority and timing of the social-engineering campaigns without malware. The synergistic effect was seen in the simulations to enhance the probability of attack success by 7-8 percentage points more than the summative probabilities and so confirmed the compounded threat of multivector strategies. Comparative defensive modelling has shown that hybrid structures, which include awareness training, USB control mechanisms and anomaly-based detection, decreases the total compromise by more than 50 per cent and the median time to compromise dropped to 60 hours as compared to 28.5. The findings highlight the fact that the success of cybersecurity cannot only depend on technological protection but also adaptive human-oriented protection, behavioural analytics, and continued policy innovation. It is concluded that the future security systems need to move out of the human control phase to partnership and combine cognitive resilience, trust calibration, and machine intelligence to maintain digital integrity in an age of AI-enhanced deception.