Beware !! USB Devices & Removable Media are Used to Inject Cryptocurrency Mining Malware

Cybercriminals are still using USB Devices & Removable Media to perform various malicious activities and spreading Cryptocurrency Mining malware in order the mine crypto coins especially Bitcoin.

A recent report from Kaspersky reveals that around one in four users worldwide is affected by a ‘local’ cyber incident by USB devices and other removable media.

Even though Cloud-based services now take over the Digital world for storing & sharing the data, still millions of USB devices are still produced and distributed annually worldwide.

Infecting users via USB devices has been observed since 2016 and some of the victims are carrying this crypto malware infection over a year.

In this case, Asia, Africa, and South America among the most affected and some of the heavy infection are spotted in Europe and North America.

Apart from crypto mining malware there is some other malware also spreading via removable media/USBs includes the Windows LNK family of Trojans which is one of the top cyber threat in 2016.

Malware delivered via USB Devices

Windows malware family Windows LNK Malware which is used by attackers to destroy, block, modify or copy data, or to disrupt the operation of a device or its network and it was the top USB based threat in 2016.

The WinLNK Runner Trojan, which was the top detected USB threat in 2017 and it was tried to attempt  22.7millions times and infected nearly 900,000 users.

This year number target has been increased to 23 million with over 700,000 users affected users according to the Kaspersky Lab research.

In another case, Stuxnet exploits in 2010 which is one of the top 10 malicious exploits spread via removable media.

USB Based Threats Infection Process

Infection from the USB devices is considering as a local threat that will be infected directed to the user system.

According to Kaspersky, Local threats differ from threats targeting computers over the internet (web-borne threats), which are far more prevalent. Local infections can also be caused by an encrypted malicious program hidden in a complex installer.

In between 2013 to 2018, USB devices based attacks are dramatically increased following data number in Millions. Advanced Threat actors including Equation GroupFlameRegin and HackingTeam have integrated the exploit for Windows LNK vulnerability (CVE-2010-2568).

USB devices are also being used to spread crypto-mining malware is unusual that is inject via malware which secretly uses the processor capacity of the infected computer to generate the cryptocurrency.

Mitigation steps by Kaspersky

Advice for all USB users:
  • Be careful about the devices you connect to your computer – do you know where it came from?
  • Invest in encrypted USB devices from trusted brands – this way you know your data is safe even if you lose the device
  • Make sure all data stored on the USB is also encrypted
  • Have a security solution in place that checks all removable media for malware before they are connected to the network – even trusted brands can be compromised through their supply chain
Additional advice for businesses:
  • Manage the use of USB devices: define which USB devices can be used, by whom and for what
  • Educate employees on safe USB practices – particularly if they are moving the device between a home computer and a work device
  • Don’t leave USBs lying around or on display
Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

2 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

2 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

5 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

8 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

9 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

9 hours ago