Security News

Kingston Digital adds 128GB capacity options to three of its encrypted USB flash drives
2020-07-22 00:30

Kingston Digital, the flash memory affiliate of Kingston Technology Company, announced the addition of 128GB capacity options to three of its encrypted USB flash drives. The simple inclusion of encrypted USB flash drives into a daily workflow is a simple step to ensuring data is safe.

USB storage devices: Convenient security nightmares
2020-07-10 04:30

Such techniques and practices form a key part of endpoint security and help protect both computer systems and sensitive data assets from loss, as well as security threats that can be deployed via physical plug-in USB devices. The most authoritarian approach is to block the use of USB devices altogether, either by physically covering endpoint USB ports or by disabling USB adapters throughout the operating system.

Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption
2020-07-09 19:07

Honeywell says it has seen a significant increase over the past year in USB-borne malware that can cause disruption to industrial control systems. While only 11% of the malware found on USB drives was specifically designed to target industrial systems - this represents a slight drop compared to the 14% identified in 2018 - 59% of the detected threats could cause significant disruption to industrial systems, compared to only 26% in 2018.

Try2Cry Ransomware Spreads via USB Drives
2020-07-06 18:11

G Data security researchers have identified a new ransomware family that attempts to spread using infected USB drives. Dubbed Try2Cry, the new piece of ransomware borrows functionality from Spora, which first emerged three years ago.

FabulaTech USB device vulnerability exposes devices to risk
2020-06-18 14:56

A remote USB function in a software provider's code has been found to contain a significant vulnerability. "USB for Remote Desktop," works by redirecting USB devices to remote sessions over Microsoft RDP, Teradici PCoIP, or Citrix ICA Protocols.

Chinese Hackers Target Air-Gapped Systems With Custom USB Malware
2020-06-04 15:28

For years, a China-linked threat actor named Cycldek has been exfiltrating data from air-gapped systems using a previously unreported, custom USB malware family, Kaspersky reports. Both malware versions were used to target diplomatic and government entities, but each was focused on a different geography, Kaspersky believes.

Sophisticated Info-Stealer Targets Air-Gapped Devices via USB
2020-06-03 20:51

The Cycldek APT group has added a previously unknown malware dubbed USBCulprit to its arsenal, aimed at reaching air-gapped devices. "These documents are then transferred to USB drives connected to the system. This suggests the malware was designed to reach air-gapped machines, or those that are not directly connected to the internet or any other computer connected to internet."

Bogus Security Technology: An Anti-5G USB Stick
2020-05-29 17:02

Its website, which describes it as a USB key that "Provides protection for your home and family, thanks to the wearable holographic nano-layer catalyser, which can be worn or placed near to a smartphone or any other electrical, radiation or EMF emitting device". "Through a process of quantum oscillation, the 5GBioShield USB key balances and re-harmonises the disturbing frequencies arising from the electric fog induced by devices, such as laptops, cordless phones, wi-fi, tablets, et cetera," it adds.

New fuzzing tool for USB drivers uncovers bugs in Linux, macOS, Windows
2020-05-28 12:09

With a new fuzzing tool created specifically for testing the security of USB drivers, researchers have discovered more than two dozen vulnerabilities in a variety of operating systems. "USBFuzz discovered a total of 26 new bugs, including 16 memory bugs of high security impact in various Linux subsystems, one bug in FreeBSD, three in macOS, and four in Windows 8 and Windows 10, and one bug in the Linux USB host controller driver and another one in a USB camera driver," Hui Peng and Mathias Payer explained.

'VictoryGate' Botnet Infected 35,000 Devices via USB Drives
2020-04-24 13:12

ESET managed to sinkhole several command and control servers of a botnet that propagates via infected USB devices, thus disrupting its activities. Referred to as VictoryGate and active since at least May 2019, the botnet impacted devices in Latin America the most, especially Peru, where more than 90% of the compromised devices are located.