02:08 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

Wombat Launches Simulated Attack Service To Reduce Use Of Rogue USBs

SaaS product enables security officers to assess and train employees not to use removable memory devices of unknown origin

Wombat Security Technologies (Wombat), a leading provider of cyber security awareness and training solutions, today announced it is launching the industry's first simulated USB attack service to address the growing threat of fraud due to rogue memory devices loaded with malicious malware and spyware. Wombat's USBGuru&trade is a software-as-a-service product that enables security officers toassess and train employees not to use removable memory devices of unknown origin. An expansion of Wombat's family of Social Engineering Assessment products, USBGuru improves upon traditional penetration testing, allowing organizations to assess and mitigate risk at the same time by teaching employees to defend against attack. USBGuru follows in the footsteps of PhishGuru, Wombat's award winning email phishing simulation service, recognized for its ease-of-use and proven effectiveness.

"Advanced persistent threats continue to target the human element within organizations with the malicious use of memory devices as one of the most recent attack vectors to threaten businesses, said Joe Ferrara, President and CEO of Wombat Security Technologies. "Performing mock attacks on end users and providing just-in-time training has already been scientifically proven to be effective at reducing user susceptibility to attack. Wombat's new service will extend this training to the use of memory devices to help companies protect against the latest breeds of malware and spyware used to infect corporate networks and steal valuable data."

How it Works

Security officers use Wombat's cloud-based interface to easily create a custom executable file with brief training embedded in the file. The executable file is saved onto removable memory devices which can be distributed to any location in and around their organization. When an employee plugs the rogue USB drive into their computer they will be presented with just-in-time training. The training message will explain the risks associated with removable memory devices and provide practical advice to the employee. The USBGuru administrator interface provides detailed reports for security officers to know who is most susceptible to memory device attack, track training completion, and group susceptible individuals together for targeted follow up.

By assessing and training employees throughout the year, Wombat's new USBGuru attack simulation service enables security officers to:

· Determine the risk their organization faces due to the use of rogue memory devices by employees

· Understand which employees are most susceptible to these attacks and who should receive additional training

· Provide a teachable moment that ensures employees will follow company policy and only use USB drives they acquired personally, or through their IT department

· Increase acceptance of security awareness training

· Protect corporate networks from Malware, Spyware and other malicious software

Wombat also provides complementary software training modules that can be used in conjunction with mock or simulated attacks to reinforce learned concepts. The combination of simulated attacks and interactive training modules provides the capacity for continuous improvement so security officers can improve their company's security posture by changing employee behavior.

Ferrara continued, "The USBGuru simulated attack service is yet another tool in Wombat's comprehensive arsenal of security awareness and training solutions that empower security officers to tackle today's most pressing cyber security issues including e-mail security, password management, social networking, web browsing, smartphone/BYOD vulnerabilities, phishing and social engineering.

Wombat's USBGuru simulated attack service is available now, just in time for Cyber Security Awareness month in October. For pricing and/or more information, please visit

About Wombat Security Technologies

Wombat Security Technologies helps organizations combat cyber security threats with uniquely effective software-based training solutions. Wombat offers fully automated, highly scalable software-based training solutions, built on learning science principles. They offer mock attacks with brief embedded training, as well as a full complement of 10-minute software training modules. Wombat's training solutions have been shown to reduce employee susceptibility to attack by up to 70%. Wombat is helping Fortune 500 customers, large government agencies and small to medium businesses in segments such as finance, banking, higher education, retail, technology, energy, insurance, and consumer packaged goods strengthen their cyber security defenses. For more information visit or contact Lorraine Kauffman-Hall at 704-882-0443 or lhall(at)attainmarketing(dot)com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.