The truth about USB malware and safety best practices
by:
Nick Lewis
Nick Lewis
A strain of malware can steal data from a USB device itself rather than infect a network or system. Nick Lewis explains how to mitigate the threat.
Computers
at the International Atomic Energy Agency (IAEA) were infected by Universal
Serial Bus (USB) malware, but I heard that these malware attacks did not infect
networks/systems but steal data directly from USB devices. Can you please
explain how this attack works and the best ways to thwart similar attacks?
Infecting
systems over the network has almost become passé given the releases from Edward
Snowden around the NSA using Bluetooth and other methods to compromise systems
and steal data. Defending against these sorts of attacks is eventually going to
require a Faraday cage and no communications interconnects whatsoever. Even
common criminals nowadays are using Bluetooth in skimmers on gas pumps to steal
credit card data.
In the IAEA
attack, it appears that only those computers in a public meeting area were
infected with malware that reportedly compromised data on any USB drives that
connected to the computers. While visitors and staff in this area might have
had a reasonable expectation that these systems were secure, they were
mistaken. Other devices that were not in open spaces do not appear to have been
affected.
To protect
the USB drives in your enterprise from a similar attack, advise employees to
only use known secure computers or their own system or, if only a public
computer is available, use a thumb drive with no other information on it other
than the data needed for a particular presentation for that day.
Additionally, there are many USB drives
available that have software that runs a sandbox or protects against infected
systems. Alternately, enterprises could set up a VPN to a secure terminal
server with two-factor authentication to minimize the chances of data being
copied to the local system and compromised.
No comments:
Post a Comment