The methodologies employed in these wide spread attacks is typically the combination of new vulnerabilities and custom Trojan horses delivered over the web or through email.
The USB port is used for charging or file transfers, though you can also email files to your device (via the custom address each Kindle is assigned) or upload them through the Cloud Player service.