Breaking
February 22, 2025

The threats of USB-based attacks for critical infrastructure | usagoldmines.com

At a time when the risks of AI-powered and advanced email-borne cybersecurity threats dominate the news agenda, it might be easy to overlook the dangers of some of the age-old attack vectors that continue to be exploited by cybercriminals.

For industries that rely on removable media – such as USB drives – there is a continued need for vigilance as these devices have the potential to trigger damaging and highly costly cyberattacks.

The resurgence of USB-based attacks

USB devices are commonly used in a number of core Critical National Infrastructure (CNI) sectors such as manufacturing, utilities and healthcare. These sectors rely on USB drives to transfer data in environments with limited or no internet access, such as air-gapped systems that isolate critical assets and data from external networks for security purposes.

In operational technology (OT) environments USB drives are often the only practical way to transfer data between systems that are deliberately kept offline, making them a common tool for software updates or data migration.

This widespread use makes USB drives a prime target for cyberattacks. One prominent example is the Sogu malware, deployed by the hacker group UNC53, which used infected USB drives to infiltrate multiple organizations last year. This campaign targeted industries in countries like Egypt and Zimbabwe, where USB drives are integral in day-to-day business operations.

Recent USB-based attack techniques have grown in sophistication, often bypassing advanced security layers by exploiting the inherent trust between the USB device and the host.

Longstanding techniques like “Rubber Ducky” keystroke attacks, which silently copy user activity and send information back to the attacker’s host system, are being deployed in new ways. For example, some human interface devices (HIDs) like mice and keyboards can have their firmware modified to inject the keystrokes to install covert malware.

A favorite for penetration testers and social engineers alike looking to entice unwary employees or visiting partners to pick up and insert a compromised USB device.

Why securing removable media presents a unique challenge

Managing removable media presents several challenges, particularly in OT-heavy environments.

USB-based attacks bypass traditional network security, allowing attackers to exfiltrate sensitive data or gain long-term access to systems. These attacks are especially dangerous in isolated systems, where the lack of network connectivity can delay detection and prolong attackers’ dwell time.

This makes them a perfect vector for malware infections, data breaches, and unauthorized access. Infected USB drives can easily introduce malicious software into systems that aren’t regularly monitored, leading to potential data loss or operational disruptions. Without strict device and data controls, USB drives can introduce malware or allow unauthorized access to sensitive systems.

One of the key challenges that organizations have in addressing these security risks is that they often lack visibility into what people and what devices they connect to their systems or how data is transferred, making policy enforcement more challenging.

It’s not only the security risks of malware that present a problem; the theft or loss of unencrypted data on removable media, poses a significant risk, particularly in highly secure environments.

How to keep malicious data from USB drives out of the system

Mitigating these risks requires a multi-layered approach to security that combines both technical and policy-based solutions. Real-time monitoring of devices is essential; any USB connected to a system should be scanned for malware and suspicious activity, enabling threats to be detected before they compromise the network.

Data sanitization plays a key role in this process. By cleaning files transferred via USB, organizations can remove any hidden malware or malicious content, ensuring that only safe data enters their network.

For organizations in the CNI sector, a more robust solution might include air-gapped systems combined with a cybersecurity kiosk that scans and sanitizes all incoming and outgoing media. Cleaning all files of malicious content using Content Disarm and Reconstruction (CDR) techniques and placed in secure isolated data vaults. Only sanitized and validated data from these vaults being allowed access into the operational technology networks. These systems ensure that any device entering a secure environment is first cleared of potential threats, adding an extra layer of protection.

Controller access and policies are key

In addition to these technical controls, policy measures governing the use of removable media are a vital component of a strong defense.

Organisations should implement strict controls over which USB devices can access critical systems and regulate the types of files that can be transferred onto any removable media. By limiting access to authorised personnel and approved data, companies can minimise the risk of devices compromising their network. Policies and procedures should mandate that any USB drive should be scanned and its contents sanitised before its data is allowed into the organisations. This can be achieved at scale using a dedicated scanning kiosk application.

Employee and supply chain partner education is also crucial. The root cause of USB-based attacks can often be traced back to human error – such as using unsecured or unauthorized devices – and comprehensive training can help mitigate these risks. Users should be taught about encryption, the dangers of using unknown USB devices, and best practices for safely ejecting devices to prevent data corruption or malware. In high-risk sectors, regular audits of how USB drives are being used and how security protocols are being followed can further strengthen an organization’s defenses.

Keeping USB drives on the cybersecurity agenda

USB devices remain a significant security threat, especially in sectors where they are essential for data transfer. Even organizations that don’t routinely use removable media in their workflows should be aware of the threat they pose.

A comprehensive approach that combines real-time monitoring, device control, and data sanitization, along with strict access policies and user education, will cover all the bases and minimize the chances of falling victim to USB-borne threats.

We’ve rated the best identity management software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

LG UltraGear 27GX790A-B review: A monitor for competitive gamers | usagoldmines.com

Sandisk's revolutionary new memory promises DRAM-like performance, 4X capacity at half the price way...

New DJI leaks reveal not one but two action cameras could be launching soon | usagoldmines.com

Quordle hints and answers for Sunday, February 23 (game #1126) | usagoldmines.com

NYT Strands hints and answers for Sunday, February 23 (game #357) | usagoldmines.com

NYT Connections hints and answers for Sunday, February 23 (game #623) | usagoldmines.com

Bored of the zombies in The Walking Dead? MGM Plus’ Earth Abides is a refreshing change to the usual...

Best wireless keyboards 2025: Top Bluetooth and USB models | usagoldmines.com

Top Stories: iPhone 16e Announced, iOS 18.4 Beta, and More MacRumors Staff | usagoldmines.com

Marvel's Thunderbolts movie: release date, trailers, confirmed cast, story synopsis, and more news a...

Sandisk plans 256TB SSD in 2026 and 512TB SSD in 2027 and no, you won't be able to install it in you...

Apple's AirTag 4-Pack Drops to Record Low $69.99 Price on Amazon Mitchel Broussard | usagoldmines.co...

I tested an ultra-cheap Dolby Atmos soundbar against a premium alternative, here's why it's worth sp...

'Revolutionary' Wi-Fi router which can send data up to 10 miles away goes on sale for less than $100...

The seemingly indestructible fists of the mantis shrimp can take a punch Elizabeth Rayne | usagoldmi...

iPhone 16e benchmarks point to performance, RAM, and charging speed details | usagoldmines.com

This EV could reboot medium-duty trucking by not reinventing the wheel Tim Stevens | usagoldmines.co...

The Handmaid's Tale season 6: everything we know so far about the hit Hulu show’s return | usagoldm...

ICYMI: the week's 8 biggest tech stories, from the iPhone 16e to Wi-Fi 7 routers and a crackdown on ...

Still using Adobe Acrobat? You may want to switch to this affordable alternative | usagoldmines.com

It’s easier than ever to add a touchscreen display to your car | usagoldmines.com

I used NoteBookLM to help with productivity - here’s 5 top tips to get the most from Google’s AI aud...

OpenAI confirms 400 million weekly ChatGPT users - here's 5 great ways to use the world’s most popul...

California Nominates Steve Jobs for $1 American Innovation Coin Juli Clover | usagoldmines.com

German startup to attempt the first orbital launch from Western Europe Stephen Clark | usagoldmines....

Android 16’s Live Update Notifications Look Awesome Tim | usagoldmines.com

Here's a Look at Apple's Secret Modem Testing Lab Where C1 Was Developed Juli Clover | usagoldmines....

DEAL: Galaxy S25 Ultra for $399, Get Galaxy Buds 3 Pro for $10 ($1260 Off) Tim | usagoldmines.com

How Apple Watch, Fitbit, Garmin, Oura, and Whoop Compare on Measuring HRV Beth Skwarecki | usagoldmi...

Here's How Four Major Newsrooms Are Using AI Michelle Ehrhardt | usagoldmines.com

Researchers figure out how to get fresh lithium into batteries John Timmer | usagoldmines.com

Leaked chat logs expose inner workings of secretive ransomware group Dan Goodin | usagoldmines.com

Under new bill, Bigfoot could become California’s “official cryptid” Nate Anderson | usagoldmines.co...

Texas measles outbreak may have spread to New Mexico; total cases near 100 Beth Mole | usagoldmines....

Windows tests long-awaited changes to Start, Share, and Search | usagoldmines.com

I Make This Easy and Elegant 'King Cake' to Impress My Guests Allie Chanthorn Reinmann | usagoldmine...

Everything New in iOS 18.4 Beta 1 Juli Clover | usagoldmines.com

Lenovo is going all out with yet another funky laptop design: this time, it's a business notebook wi...

“Bouncing” winds damaged Houston skyscrapers in 2024 Jennifer Ouellette | usagoldmines.com

Asus’ new “Fragrance Mouse” is a wireless mouse that also smells Andrew Cunningham | usagoldmines.co...

Dangling, twitching human robot with synthetic muscles makes its debut Benj Edwards | usagoldmines.c...

Unblockable ads now litter Microsoft’s Windows Surface app | usagoldmines.com

Best gaming laptops 2025: What to look for and highest-rated models | usagoldmines.com

'Fix Me a Plate' Is the Cookbook You Need for Hearty Meals Allie Chanthorn Reinmann | usagoldmines.c...

Download Your Kindle Books While You Still Can Emily Long | usagoldmines.com

I installed iOS 18.4 dev beta and the big Siri intelligence update is nowhere to be found lance.ulan...

F1 may ditch hybrids for V10s and sustainable fuels Jonathan M. Gitlin | usagoldmines.com

Elon Musk to “fix” Community Notes after they contradict Trump Ashley Belanger | usagoldmines.com

Microsoft’s new Majorana 1 chip is a quantum computing breakthrough | usagoldmines.com

4 things to expect at Amazon’s AI Alexa event | usagoldmines.com

Nine Tricks That Make Painting Any Room a Lot Easier Jeff Somers | usagoldmines.com

The Echo Show 15 Is $100 Off Right Now Daniel Oropeza | usagoldmines.com

Apple News+ Gains Recipes, Restaurant Reviews, and More in iOS 18.4 Juli Clover | usagoldmines.com

iOS 18.4 Adds New Ambient Music Feature Juli Clover | usagoldmines.com

Revamped Mail App With Built-In Categorization Comes to Mac and iPad Juli Clover | usagoldmines.com

iOS 18.4 Adds Apple Intelligence Priority Notifications Feature Juli Clover | usagoldmines.com

This is the weirdest laptop I've ever seen and it reminds me of an often-mocked, thoroughly misunder...

Amazon just overtook Walmart in revenue for the first time | usagoldmines.com

As the Kernel Turns: Rust in Linux saga reaches the “Linus in all-caps” phase Kevin Purdy | usagoldm...

RFK Jr. promptly cancels vaccine advisory meeting, pulls flu shot campaign Beth Mole | usagoldmines....

New Dockcase 7-in-1 Hub is Latest Favorite Accessory, Available on Kickstarter Tim | usagoldmines.co...

I Tested Grok 3, and It's Not Worth the Price Hike Khamosh Pathak | usagoldmines.com

The Six Best Methods for Paying Off Credit Card Debt Meredith Dietz | usagoldmines.com

Best Apple Deals of the Week: Big Apple Watch Series 10 Discounts Hit Alongside AirPods and More Mit...

Apple Seeds First Betas of tvOS 18.4 and watchOS 11.4 Juli Clover | usagoldmines.com

Apple Seeds First Beta of macOS Sequoia 15.4 Juli Clover | usagoldmines.com

Apple Releases First visionOS 2.4 Beta With Apple Intelligence, Spatial Gallery and More Juli Clover...

Apple Releases First Beta of iOS 18.4 With New Vision Pro App Juli Clover | usagoldmines.com

Meze Audio's beautiful new wired headphones have a new kind of planar magnetic driver, hand-finished...

Top US mineral firm hit by cyberattack that saw thieves steal $500,000 | usagoldmines.com

"We will never build a backdoor" – Apple kills its iCloud's end-to-end encryption feature in the UK ...

Google has stopped selling the Chromecast with Google TV – but there's no way I'm replacing mine | ...

Security flaw in popular stalkerware apps is exposing phone data of millions | usagoldmines.com

The Oppo Find N5 has made me even more excited for the Samsung Galaxy S25 Edge – here’s why jamie.ri...

Apple Intelligence finally arrives on Vision Pro, but it's the new iOS app that might turn heads lan...

Google’s cheaper YouTube Premium Lite subscription will drop Music Ryan Whitwam | usagoldmines.com

Notorious crooks broke into a company network in 48 minutes. Here’s how. Dan Goodin | usagoldmines.c...

Samsung’s tiny 128GB flash drive is a steal at this deal price: $14 | usagoldmines.com

This 34-inch Gigabyte ultrawide OLED gaming monitor is 39% off | usagoldmines.com

Here’s the Nothing Phone 3a and 3a Pro Tim | usagoldmines.com

This Blink Video Doorbell Is at Its Lowest Price Ever Pradershika Sharma | usagoldmines.com

My Favorite Amazon Deal of the Day: The Samsung Galaxy Watch Ultra Daniel Oropeza | usagoldmines.com

The MacRumors Show: iPhone 16e Announced! Hartley Charlton | usagoldmines.com

An Apple Store is on the Move in the UK Joe Rossignol | usagoldmines.com

iPhone 16e Continues Apple's Transition to Manufacturing in India Hartley Charlton | usagoldmines.co...

Apple pulls end-to-end encryption in UK, spurning backdoors for gov’t spying Ashley Belanger | usago...

DeepSeek goes beyond “open weights” AI with plans for source code release Kyle Orland | usagoldmines...

A cheaper YouTube Premium plan is coming ‘soon’ for users in the US | usagoldmines.com

Lenovo laptops get an F rating for repairability | usagoldmines.com

GTA V for PC will get ray tracing and more with big visual update in March | usagoldmines.com

Make sure you update your AM5 motherboard for the Ryzen 9 9950X3D | usagoldmines.com

Turn Off Uber's Preferred Currency Feature to Avoid a Fee Emily Long | usagoldmines.com

Google's 'Career Dreamer' Claims It Can Help You Find a Job to Match Your Skills David Nield | usago...

Apple Denies Speculation Surrounding iPhone 16e's Lack of MagSafe Joe Rossignol | usagoldmines.com

Is the Apple Watch SE next for the chop? The surprise iPhone 16e reveal could hint at more changes t...

Salt Typhoon hackers used this clever technique to attack US networks | usagoldmines.com

An episode of The Simpsons? Fake speakers found in Chinese Volvos. Jonathan M. Gitlin | usagoldmines...

HP realizes that mandatory 15-minute support call wait times isn’t good support Scharon Harding | us...

SEC’s “scorched-earth” lawsuit against Coinbase to be dropped, company says Ashley Belanger | usagol...

Nissan’s latest desperate gamble—see if Tesla will buy the company Jonathan M. Gitlin | usagoldmines...

Leave a Reply