USBCleaver unlike similar malware on Android which is more focused on remote eavesdropping, seems to be designed to facilitate a targeted attack by gathering details that would be helpful in a later infiltration attempt. USBCleaver’s Windows-infecting routine can be blocked by disabling the Autorun feature on Windows systems. This feature is disabled by default on Windows 7 machines.
Read more here – http://www.f-secure.com/weblog/archives/00002573.html