Threats and risks from malware on USB Flash
USB is probably the oldest and most commonly used storage device in the world. In addition to the undisputed benefits, USB flash drives sometimes contain risks that cannot be underestimated if not used properly.
A USB flash drive, basically, is a type of data storage device that uses flash memory integrated with the USB interface. This type of hard drive can be infected with viruses and ransomware (accidentally or intentionally) and used for malicious purposes, causing damage to their users. There are even malicious software designed specifically for USB, which turns the USB device into an intermediary malware infection tool on the computer, thereby stealing login information and sensitive data.
Some use cases of USB flash drives spread malicious code
Malicious USB sticks are the number one choice for attackers when they have physical access to the target computer. The first incident was officially recorded in 2010 when some security researchers discovered the infamous 'poison' Stuxnet distributed via USB with the aim of launching malicious attacks against Network system of a facility in Iran.
Or the case of a malware called UsbFakeDrive in 2013 with a quite unique mechanism of infection. After successfully infecting the USB device, the malicious code will create another drive in that USB drive and force users to open the second drive to see the data. In essence, the second drive is a shortcut that contains the virus file. When a user opens the data, it is also when the computer is infected with malware from USB.
Previously, AutoRun virus has also been raging around the world with the mechanism of opening the drive is activating malicious code. This makes the spread of this virus on Windows systems uncontrollable.
How to use infected USB device to cause damage?
The ultimate and most dangerous purpose of the malware infection via USB drive is to gain control of the system and steal data. This can be done remotely by hackers with the help of malware, adware, spyware or gray software when they successfully infect the target computer.
In addition, with the emergence and outbreak of ransomware in the past two years, hackers could gain illicit profits by spreading this malicious code via USB, causing serious damage. masonry for organizations and individuals.
How to protect the system from malicious USB
- Do not plug unspecified USB into important computers. Hitting people's curiosity is also an attack technique of malicious agents. This is especially true in case you picked up a USB flash drive somewhere.
- Do not use the same USB flash drive for both home and work computers. This can reduce the risk of cross-contamination between computers.
- Always enable security features like fingerprint authentication for USB connections. This will help protect the device from hackers' physical access.
- Always update the software on your computer to the latest version for maximum protection against known types of malware and security holes.
You should read it
- Warning: New malicious code is infecting about 500,000 router devices
- Discover a new kind of malicious code that can record the phone call to extort money
- Find bug in Emotet malware, prevent it from spreading for 6 months
- Fileless malware - Achilles heel of traditional antivirus software
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
- Malicious code is growing up
- Malware sneaks into iOS through Apple's official distribution channels
- Warning of new malware appear like Wannacry, capable of deleting Vietnamese percussion on computer
May be interested
- Link download Malwarebytes Anti-Malware 4.3.0.206malwarebytes anti-malware is a free malware detection tool that helps to find out threats that have ingrained in your windows system.
- How to see which Windows Defender has found malware on a PCif you use windows defender antivirus to detect and remove malware on windows 10, you can easily monitor the performance of defender with an integrated list of all threats that the utility has detected on your pc. .
- The painful and prolonged death of Flashif you have been using the internet for a long time, not only have you used flash in recent years. historically, this platform has become a popular platform on the web and without smartphones it can still last today.
- Top 5 best Malware removal software 2020top 5 best malware removal software in 2020. as you all know viruses, malware or malware are always great threats to our computers. therefore, to ensure the security of our information and data, the anti-m software
- 8 tips to help flash games run fasterif you experience crashes when playing, the following article will explain how to make flash games run faster, so you can enjoy your favorite games at a normal frame rate.
- SV joins the top 10 global threatsremote access trojan (rat) named flawedammyy recently joined the top 10 global threat index list.
- Stalkerware and security risks for businessessome legitimate, useful and necessary applications can be turned into stalkerware if they fall into the hands of a hacker.
- How to Clean a Computer of Malwarethis wikihow teaches you how to find and remove malware from your windows or mac computer. typically speaking, an antivirus scan will be enough to remove most major threats to your computer. if you're having trouble with your malware...
- Instructions on how to install Adobe Flash Player on your computeradobe flash player is a program that supports web browsers to be able to watch high quality videos and images. in particular, flash player helps users to play online games on web browsers easily.
- Three ways to protect Mac from malware threatsapple has now introduced an entirely new model that is extremely impressive and no doubt its market share will be expanded. it was good news for apple but raised concerns about security. the more people switch to using apple products, the more likely it is that the malware will be pulled.