Tuesday, May 13, 2025
HomeMalwareEmployee Watched Porn at Work via 9000 Web pages Drops Malware on...

Employee Watched Porn at Work via 9000 Web pages Drops Malware on U.S Government Network

Published on

SIEM as a Service

Follow Us on Google News

An Employee of  US Geological Survey (USGS) has a habit of watching pornography contents during Work hours and visiting the extensive history of porn websites which drop malware on Government Network.

U.S. Geological Survey (USGS), U.S based Earth Resources Observation and Science (EROS) Center provide science about the natural hazards that threaten lives and livelihoods; the water, energy, minerals, and other natural resources.

An IT security audit that was conducted at the U.S. Geological Survey (USGS) computer network reveals that the Employee visiting over 9000 web pages using U.S Government computers that routed via websites that originated in Russia and contained malware.

- Advertisement - Google News

It was confirmed by the forensic report he/she saved many of the pornography images were saved in unauthorized personal USB and Android devices.

Officials said, “During the investigation, we identified two vulnerabilities in the USGS’ IT security posture: website access and open USB ports. Malware is rogue software that is intended to damage or disable computers and computer systems.”

The main motivation of the malware that dropped from the Russian based website is intended to steal the sensitive information from the government network.

According to the report that issued by  U.S. Department of the Interior’ s (DOI’s) IT Rules of Behavior prohibit employees from using DOI systems for illegal or inappropriate activities, explicitly including the viewing or distribution of pornography..

Also, they didn’t reveal the details about the Malware and the employee details who was involved in this activities.

USGS Recommendation for Better security 

USGS recommended to follow strong blacklist policy of known rogue URL or domains and regularly monitor employee web usage history.

Direct employees to refrain from connecting personal devices, such as USB drives and cell phones, to Government-issued computers or networks.

“EROS Center has deployed enhanced intrusion detection systems and firewall technology to assist in the prevention and detection of rogue websites trying to communicate with Government systems”

We further recommend that USGS employ an IT security policy that would prevent unauthorized USB devices on all employee computers.

Best practices for malware incident protection include restricting the use of removable media and personally owned mobile devices.

Also Read:

Beware! Downloader Malware Disguised as Game Apps Found On Google Play with More Than 51,100 Installations

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Apple Releases Security Patches to Fix Critical Data Exposure Flaws

Apple released critical security updates for macOS Sequoia 15.5 on May 12, 2025, addressing...

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...