Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Dangerous New USB Trojan Discovered
Newest First  |  Oldest First  |  Threaded View
Jeremseo
50%
50%
Jeremseo,
User Rank: Strategist
4/5/2016 | 10:52:50 AM
USB User
For me I am still a big USB user... I feel it is an old habit, even on work we have clouds, still, USB is my first choice.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/29/2016 | 10:42:09 AM
No USB going forward?
I am also not how many of us are using USB sticks these days anymore. I was a heavy users for backups points of view but now I store everything in the cloud and I never need a USB drive on my devices. :--))

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/29/2016 | 10:39:23 AM
Re: File Creation Timestamps
I agree. File attributes are not real indicators what is happening. They can easily be modified and dynamically changed on the fly.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/29/2016 | 10:37:48 AM
Re: Use HASHDEEP to detect the resulting stolen data
I assume there is always a way to see the trace if you analyze the USB drive itself. It is still playing a catch up tough. USB sticks are real danger to businesses.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/29/2016 | 10:35:41 AM
Re: interesting to know
This is actually not a new news, we have heard that USB device can easily be used to exploit vulnerabilities in the past. We all need to be cautious on that.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/29/2016 | 10:33:35 AM
USB port
 

USB port is a powerful way to access a secure network. When an employee finds a USB stick on the parking lot he/she feels lucky and wants to check what is in it. Super effective way of infecting computers and networks. May be it is time to block all USB ports :--))
theb0x
50%
50%
theb0x,
User Rank: Ninja
3/28/2016 | 1:38:18 PM
File Creation Timestamps
It is very easy to tamper with file timestamps. Creation time/date / modified..etc.

 
bpaddock
50%
50%
bpaddock,
User Rank: Strategist
3/28/2016 | 12:46:38 PM
Use HASHDEEP to detect the resulting stolen data
The program HashDeep has a negative audit mode that would show any additons to the USB stick.
The filename would not mater.  The article does not address where the stolen data file is stored at.
Is it always stored in the same place?

md5deep.sourceforge.net/start-hashdeep.html
batye
50%
50%
batye,
User Rank: Apprentice
3/25/2016 | 11:07:42 PM
interesting to know
interesting to know thank you 


News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...