Tuesday, April 22, 2025
HomeBitcoinBeware !! USB Devices & Removable Media are Used to Inject Cryptocurrency...

Beware !! USB Devices & Removable Media are Used to Inject Cryptocurrency Mining Malware

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals are still using USB Devices & Removable Media to perform various malicious activities and spreading Cryptocurrency Mining malware in order the mine crypto coins especially Bitcoin.

A recent report from Kaspersky reveals that around one in four users worldwide is affected by a ‘local’ cyber incident by USB devices and other removable media.

Even though Cloud-based services now take over the Digital world for storing & sharing the data, still millions of USB devices are still produced and distributed annually worldwide.

- Advertisement - Google News

Infecting users via USB devices has been observed since 2016 and some of the victims are carrying this crypto malware infection over a year.

In this case, Asia, Africa, and South America among the most affected and some of the heavy infection are spotted in Europe and North America.

Apart from crypto mining malware there is some other malware also spreading via removable media/USBs includes the Windows LNK family of Trojans which is one of the top cyber threat in 2016.

Malware delivered via USB Devices

Windows malware family Windows LNK Malware which is used by attackers to destroy, block, modify or copy data, or to disrupt the operation of a device or its network and it was the top USB based threat in 2016.

The WinLNK Runner Trojan, which was the top detected USB threat in 2017 and it was tried to attempt  22.7millions times and infected nearly 900,000 users.

This year number target has been increased to 23 million with over 700,000 users affected users according to the Kaspersky Lab research.

In another case, Stuxnet exploits in 2010 which is one of the top 10 malicious exploits spread via removable media.

USB Based Threats Infection Process

Infection from the USB devices is considering as a local threat that will be infected directed to the user system.

According to Kaspersky, Local threats differ from threats targeting computers over the internet (web-borne threats), which are far more prevalent. Local infections can also be caused by an encrypted malicious program hidden in a complex installer.

In between 2013 to 2018, USB devices based attacks are dramatically increased following data number in Millions. Advanced Threat actors including Equation GroupFlameRegin and HackingTeam have integrated the exploit for Windows LNK vulnerability (CVE-2010-2568).

USB devices are also being used to spread crypto-mining malware is unusual that is inject via malware which secretly uses the processor capacity of the infected computer to generate the cryptocurrency.

Mitigation steps by Kaspersky

Advice for all USB users:
  • Be careful about the devices you connect to your computer – do you know where it came from?
  • Invest in encrypted USB devices from trusted brands – this way you know your data is safe even if you lose the device
  • Make sure all data stored on the USB is also encrypted
  • Have a security solution in place that checks all removable media for malware before they are connected to the network – even trusted brands can be compromised through their supply chain
Additional advice for businesses:
  • Manage the use of USB devices: define which USB devices can be used, by whom and for what
  • Educate employees on safe USB practices – particularly if they are moving the device between a home computer and a work device
  • Don’t leave USBs lying around or on display
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling...

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that...

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious...

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung's One UI interface: the clipboard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation

Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit...