Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

USB Drives Remain Critical Cyberthreat

USB thumb drives may be used less frequently than before, but they are still commonly used as infection vectors for a wide variety of malware.

Small USB sticks can mean big security troubles, according to a new report out today. While USB thumb drives have been overtaken by cloud services as convenient ways to move files from one system to another, they are still commonly used as infection vectors for a wide variety of malware.

"USB threats from malware to miners," published on Kaspersky Labs' SecureList, looks specifically at the threats posed by the pocketable devices. According to the report, the Windows LNK malware family is the top threat, with over 22.7 million attempted WinLNK.Agent infections detected. They affected nearly 900,000 users in 2017 and, so far, just over 700,000 users in an estimated 23 million attacks in 2018.

"USB devices may be less effective at spreading infection than in the past, due to growing awareness of their security weakness and declining use as a business tool, but our research shows they remain a significant risk that users should not underestimate," said Denis Parinov, anti-malware researcher at Kaspersky Lab, said in a prepared statement. 

It's a risk that can actually grow with added security. In an interview at this week's Ignite 2018, Rob Lefferts, corporate vice president for Microsoft 365, security, and compliance at Microsoft, pointed out that security procedures that add too much "friction" to business processes are the source of shadow IT. "If you make things too difficult, slow things down too much, it drives users to put files on a USB drive or go to their own cloud service. They're going to get their work done," he said.

Because USB sticks continue to get the work of carrying malware done, they have been frequent infection vehicles for malware families dating back as far as five years, according to the report. They are not simply vehicles for malicious nostalgia, though; the report notes that the USB payload can include cryptominers (often piggybacking on Trojans known since at least 2014).

USB drives are a global problem, but they're especially prevalent in developing nations that may see more use of the small devices. The report notes that nations with less-developed communication infrastructures tend to see more local incidents of malware, such as root drive infections, while areas with better networking are more likely to be targeted by cryptominers and other revenue-generating issues.

The report concludes with advice for minimizing the chances of malware infection through a USB drive. That includes being careful with unknown USB devices, investing in encrypted USB drives when they are necessary for business use, and putting a plan in place for checking every USB device (and every file on them) for malware prior to the files being transferred to any production machine.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/27/2018 | 3:31:08 PM
Re: USB drives?
Dr.T - you have an interesting style, taking one or two sentences for reply and bumping up about 7 responses.  True tech is FAR more sophisticated now than when 3.5" floppy drives were the world.  True that virus and malware is that much more sophisticated too.  I remember the Anna Kournikovia virus well.  I loved ZORK and those old games that are now long gone.  Some days i actually yearn for DOS 6.22 which was rock solid compared to today.  But the basic idea of taking something out of a pocket and slipping it into a slot and infecting is the same same same.  Just ask Bradley Manning.  
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:14:08 PM
Re: Authorized USB's
Just media changes and the threats are always out there. I agree. Also threats got way sophisticated on that media.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:12:56 PM
Re: Authorized USB's
I remember 20 years ago when we were warned not to put that floppy disk from Uncle Ed into a system That is true, impact was not that big at that time it is huge now.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:11:37 PM
Re: Authorized USB's
You can then take the hardware regex's and white list the auth USB through DLP software or Endpoint A/V software. Yes, that makes sense. Authenticated USB may still be harmful tough.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:10:29 PM
Re: Authorized USB's
o take it one step further for best security practice, your company should have a policy around authorized USB's Or as simple as blocking USB ports so they are not being used.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:09:31 PM
USB drives?
I think it is not only unknown USB drives but the known ones that employees use in their insecure home computer and then plugging it in the work computer. That is a major problem.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/27/2018 | 10:31:51 AM
Re: Authorized USB's
Nothing new here only changing tech.  I remember 20 years ago when we were warned not to put that floppy disk from Uncle Ed into a system and run a program too.  THAT was a danger.  Just media changes and the threats are always out there. 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/26/2018 | 9:47:41 AM
Authorized USB's
The end of the article provides sound advice. To take it one step further for best security practice, your company should have a policy around authorized USB's. You can then take the hardware regex's and white list the auth USB through DLP software or Endpoint A/V software. This will limit the scope of what can be plugged in and executed, in this discussion malware, on your machine.
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...