Friday, March 29, 2024

Beware !! USB Devices & Removable Media are Used to Inject Cryptocurrency Mining Malware

Cybercriminals are still using USB Devices & Removable Media to perform various malicious activities and spreading Cryptocurrency Mining malware in order the mine crypto coins especially Bitcoin.

A recent report from Kaspersky reveals that around one in four users worldwide is affected by a ‘local’ cyber incident by USB devices and other removable media.

Even though Cloud-based services now take over the Digital world for storing & sharing the data, still millions of USB devices are still produced and distributed annually worldwide.

Infecting users via USB devices has been observed since 2016 and some of the victims are carrying this crypto malware infection over a year.

In this case, Asia, Africa, and South America among the most affected and some of the heavy infection are spotted in Europe and North America.

Apart from crypto mining malware there is some other malware also spreading via removable media/USBs includes the Windows LNK family of Trojans which is one of the top cyber threat in 2016.

Malware delivered via USB Devices

Windows malware family Windows LNK Malware which is used by attackers to destroy, block, modify or copy data, or to disrupt the operation of a device or its network and it was the top USB based threat in 2016.

The WinLNK Runner Trojan, which was the top detected USB threat in 2017 and it was tried to attempt  22.7millions times and infected nearly 900,000 users.

This year number target has been increased to 23 million with over 700,000 users affected users according to the Kaspersky Lab research.

In another case, Stuxnet exploits in 2010 which is one of the top 10 malicious exploits spread via removable media.

USB Based Threats Infection Process

Infection from the USB devices is considering as a local threat that will be infected directed to the user system.

According to Kaspersky, Local threats differ from threats targeting computers over the internet (web-borne threats), which are far more prevalent. Local infections can also be caused by an encrypted malicious program hidden in a complex installer.

In between 2013 to 2018, USB devices based attacks are dramatically increased following data number in Millions. Advanced Threat actors including Equation Group, Flame, Regin and HackingTeam have integrated the exploit for Windows LNK vulnerability (CVE-2010-2568).

USB devices are also being used to spread crypto-mining malware is unusual that is inject via malware which secretly uses the processor capacity of the infected computer to generate the cryptocurrency.

Mitigation steps by Kaspersky

Advice for all USB users:
  • Be careful about the devices you connect to your computer – do you know where it came from?
  • Invest in encrypted USB devices from trusted brands – this way you know your data is safe even if you lose the device
  • Make sure all data stored on the USB is also encrypted
  • Have a security solution in place that checks all removable media for malware before they are connected to the network – even trusted brands can be compromised through their supply chain
Additional advice for businesses:
  • Manage the use of USB devices: define which USB devices can be used, by whom and for what
  • Educate employees on safe USB practices – particularly if they are moving the device between a home computer and a work device
  • Don’t leave USBs lying around or on display
Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles