Friday, June 21, 2024

Beware !! USB Devices & Removable Media are Used to Inject Cryptocurrency Mining Malware

Cybercriminals are still using USB Devices & Removable Media to perform various malicious activities and spreading Cryptocurrency Mining malware in order the mine crypto coins especially Bitcoin.

A recent report from Kaspersky reveals that around one in four users worldwide is affected by a ‘local’ cyber incident by USB devices and other removable media.

Even though Cloud-based services now take over the Digital world for storing & sharing the data, still millions of USB devices are still produced and distributed annually worldwide.

Infecting users via USB devices has been observed since 2016 and some of the victims are carrying this crypto malware infection over a year.

In this case, Asia, Africa, and South America among the most affected and some of the heavy infection are spotted in Europe and North America.

Apart from crypto mining malware there is some other malware also spreading via removable media/USBs includes the Windows LNK family of Trojans which is one of the top cyber threat in 2016.

Malware delivered via USB Devices

Windows malware family Windows LNK Malware which is used by attackers to destroy, block, modify or copy data, or to disrupt the operation of a device or its network and it was the top USB based threat in 2016.

The WinLNK Runner Trojan, which was the top detected USB threat in 2017 and it was tried to attempt  22.7millions times and infected nearly 900,000 users.

This year number target has been increased to 23 million with over 700,000 users affected users according to the Kaspersky Lab research.

In another case, Stuxnet exploits in 2010 which is one of the top 10 malicious exploits spread via removable media.

USB Based Threats Infection Process

Infection from the USB devices is considering as a local threat that will be infected directed to the user system.

According to Kaspersky, Local threats differ from threats targeting computers over the internet (web-borne threats), which are far more prevalent. Local infections can also be caused by an encrypted malicious program hidden in a complex installer.

In between 2013 to 2018, USB devices based attacks are dramatically increased following data number in Millions. Advanced Threat actors including Equation GroupFlameRegin and HackingTeam have integrated the exploit for Windows LNK vulnerability (CVE-2010-2568).

USB devices are also being used to spread crypto-mining malware is unusual that is inject via malware which secretly uses the processor capacity of the infected computer to generate the cryptocurrency.

Mitigation steps by Kaspersky

Advice for all USB users:
  • Be careful about the devices you connect to your computer – do you know where it came from?
  • Invest in encrypted USB devices from trusted brands – this way you know your data is safe even if you lose the device
  • Make sure all data stored on the USB is also encrypted
  • Have a security solution in place that checks all removable media for malware before they are connected to the network – even trusted brands can be compromised through their supply chain
Additional advice for businesses:
  • Manage the use of USB devices: define which USB devices can be used, by whom and for what
  • Educate employees on safe USB practices – particularly if they are moving the device between a home computer and a work device
  • Don’t leave USBs lying around or on display

Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles