The US government network is infected with malware by employees watching adult movies during the hour
According to the survey results, the US Geological Survey network (USGS) in the EROS satellite image storage center in South Dakota recently got into malware by an employee accessing thousands of adult video websites. His working computer, one of them contains malware.
He even sneaked a USB device into the office to download pornographic images despite being banned. Investigators of the US Department of the Interior's Inspector General discovered in his USD and Android phone, both of which were connected to computers that saved many pornographic images and were infected with malicious code.
Fortunately, where this guy works is a geological center, EROS only monitors and stores images of the Earth's surface, not containing sensitive information or top secret tasks.
The Inspector General of the US Department of the Interior confirmed that the national security did not suffer from any incident from this incident. In addition, the investigating agency said that malware infiltrated EROS's network is a kind of data extraction and victim extortion.
After this incident, the investigating agency also recommended that network managers should implement the policy of blocking black web, blocking USB ports, monitoring the browsing history of employees to avoid possible unfortunate circumstances. .
There is still no information about this guy's "fate".
See more:
- How to identify a link is safe?
- The malware detection is extremely dangerous, unable to destroy even if the operating system is reinstalled and the hard drive is replaced
- The Adobe Flash update may contain malware that digs encrypted money
You should read it
- Discover a new kind of malicious code that can record the phone call to extort money
- Fileless malware - Achilles heel of traditional antivirus software
- Researchers create malware based on artificial intelligence
- Threats and risks from malware on USB Flash
- 14 games on the App Store contain malicious code, iPhone users be careful
- Malicious Code EvilGnome attacks Linux systems with many rare tricks
- Android apps contain malicious code that uses motion sensors to avoid detection
- 2022 could be the year of Linux malware
- Detecting new malicious code capable of 'evading' most anti-virus software
- 10 million Android devices are preinstalled with malicious code from the factory
- A series of malicious applications that collect user data, delete immediately if you are installing
- Find bug in Emotet malware, prevent it from spreading for 6 months
Maybe you are interested
This Simple Android App Proves Anything Can Contain Malware
BadBox Malware Is Picking Up Speed, Targeting Certain Android Devices
Warning of new dangerous malware attack campaign targeting Linux
Downloaded malware? Try these fixes before factory reset!
SteelFox Trojan: Malware Turns PCs Into Cryptocurrency Mining Zombies
Remcos Alert: Ingenious Excel Phishing Campaign Spreading Dangerous Fileless Malware