From report at UK Register
Attacks on technology enterprise roll on and on. Like the Niagara Framework vulnerability just in the news, education on the latest (or old and trusty) ways to infect systems is spotty and mileage may vary. Alert employees are a great defense, as at DSM. Following training a USB device found in the parking lot at the company located in Harleen, the Netherlands, an employee turned it over to the IT department. According to the Register’s report, it was analyzed and the malware decoded and protection put in place on the company’s systems.
About 5 years ago, an acquaintance serving in Afghanistan had her laptop trashed when a virus suspected to have been injected from a thumb drive swept armed forces networks there. Cost, one Compaq and months of headaches for our Skyping. Small fry. But the larger network was heavily impacted.
Distributing infected thumb drives (using flash memory) is inexpensive and almost impossible to stop completely. The 2009-2010 wave of digital picture frame infections (among other devices) comes to mind.
- Watch That Tiny, $74 1.5GHz Android-Powered Thumb-Puter In Action (gizmodo.com.au)
- The Rise of the Data Smuggler (markmaunder.com)
- Chinese hackers steal Indian Navy secrets with thumbdrive virus (arstechnica.com)
- Defence thumb drive goes missing (news.smh.com.au)
- New $74 Android thumb drive sized computer (nextbigfuture.com)
- Use of infected Thumb Drives (USB Drives) is a major security weakness (luciusonsecurity.blogspot.com)