USB review, Part 1: How are USB flash drives a security risk? - ManageEngine Blog (2024)

USB review, Part 1: How are USB flash drives a security risk? - ManageEngine Blog (1)

We’ve all used pocket-sizedUSB drives to store and transfer data. We’ve also lost them countless times. USB sticks are a necessary convenience accompaniedbycomplex and varied risks. Besides the loss of the actual ”pendrives” as they’re also known, organizations fall prey to targeted USB attacks, which are quite common. Threats designed for USB exploits have risen from 37% to 52%, according to Honeywell’s Industrial Cybersecurity USB Threat Report 2022. Even now, in the era of the cloud, USB attacks are executed, like some of the recent occurrences mentioned below.

Recent USB incidents

Those sleek-looking drives have ledto massive exposure and data breaches. The Stuxnet attack (2010) and the USB drop attack on the Pentagon (2008) are some of the biggest data security incidents to date. Some recent attacks involving USBs include:

1.Malicious USBs mailedvia US postal services, January 2022

Malicious USBs were mailed to professionals across the defense, insurance, and transportation sectors. Some of the mail was sent impersonating the US Department Of Health, supposedly containing authorizedcoronavirusguidelines. Some others impersonated brands like Amazon, offering free gift vouchers. The USBs contained ransomwarethat helped hackers gain entry into the organizations’ networks.

2. Raspberry Robin malware detected in Windows machines, May 2022

The malware Raspberry Robin was found in Windows devices across various sectors. Raspberry Robin is a Windows worm that can drop malware into Windows devices. The worm installs and executes malware in devices, which can then be used to escalate privileges.

3. Bug in USB software allowed hackers to add fake devices, June 2020

USB for Remote Desktop is software that allows users to access a locally plugged-in USB device in remote desktop sessions. Now patched, this vulnerability could haveallowed hackers to create fake devices. Hypothetically,fake Ethernet network cards added this way could have led to network infiltration.

How do USB security risks affect an organization?

USB review, Part 1: How are USB flash drives a security risk? - ManageEngine Blog (2)

Data breach: A data breach occurs when organizational data is exposed to external entities, like when the personal data of stakeholders is published on the dark web. The consequences often strike a blow too big. Remember Equifax?

Securityinfiltration: A security breach occurs when organizational networks and devices are left exposed to external entities. It is similar to the fake devices added by hackers in the USB incident mentioned previously. Note that a security breach need not imply adata breach.

Compliance implications:Regulatory standards like the GDPR recommenddata encryption to prevent stolen data from being accessed. Fail to comply, and you’ll be handed hefty fines. On top of this, you’llend up spendingeven more on legal counsel and restoring data security controls.

Business operations interruption:When USBs are misappropriated by hackers, lots of businesshours are spent identifying exposed data. USB drives can also be used to deliver malware to endpoints.If endpoints are infected, you can’t get them up and running quickly. Incident response and remediation take higher priority, leading to downtime in business operations.

Types of USB threats

USB attacks can be caused by both internal and external entities. In most attacks, hackers trick employees or other stakeholders into pluggingharmful USBs into organizational devices. However, insiders with financial motives canalso launch attacks. Security researchers in Israel have identified up to 29 different USB attacks.

Based on the threat actor, USB attacks can be broadly classified as:

  • USB attacks perpetrated by hackers and insiders: These attacks aim to expose organizational data or tamper with business operations. Cybercriminals can also collude with insidersusing monetary deals to launch a malware infection in a network.

Examples: BadUSB attacks and rubber ducky attacks.
  • USB incidents brought about by unsuspecting employees: Negligent employees who donot follow security protocols often have their drives stolen or lose them outside the organization.

Examples:The Stuxnet attack(2010) and the Pentagon attack (2008) were brought about by inadvertent employees who plugged in unknown drives.

At least half of USB-based security incidents can be prevented by promoting user awareness and enhancing security controls on USBaccess. Instead of completely eradicating USB usage, organizations must implement better controls for the secure use of removable storage devices.

Check outthese 10 best practices to securely use removable media devices. Download infographic

How to prevent USB-based attacks

A surefire method of preventing USB attacks is to completely ban portable devices. However, this is not practical because insiders looking to exploit loopholes will find other ways. Besides, inconvenienced employees may not adhere to security protocols for want of easier data transfers.An increasing number of tools are being developed to help enforce strict controls on portable flash drives. You can even track files copied to USB drives with endpoint monitoring tools.

We will delve deeper into protection against USB threats in part two of this blog. But before we get to that, here’s a valuable resource on creating a sound DLP strategy. Download now.

The right tool to help you track risky USB actions

ManageEngine DataSecurity Plus is a unified data security and visibility platform to develop sound data protection controls. You can identify who accessed a file during non-business hours or spot questionable user actions on removable media devices. You can also:

  • Discover sensitive data in your file servers and SQL servers to help secure them sufficiently.

  • Identify risky file accesses, including file modifications and file copy activity.

  • Track where users have pasted files, including in-USB actions.

  • Allow only authorized flash drives using a trusted devices list.

  • Restrict users to only reading files on USB media drives.

  • Block network or local file copy actions by users.

Block specific USBs, allow only read access to users, prevent file copy actions, and try all our features in a free, 30-day trial.

Get a fully free, 30-day trial

USB review, Part 1: How are USB flash drives a security risk? - ManageEngine Blog (2024)
Top Articles
The Best and the Worst Times to Trade Forex
Tastytrade Help Center
11 beste sites voor Word-labelsjablonen (2024) [GRATIS]
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Costco in Hawthorne (14501 Hindry Ave)
Ogeechee Tech Blackboard
Which aspects are important in sales |#1 Prospection
The Many Faces of the Craigslist Killer
Craigslist Dog Kennels For Sale
Superhot Unblocked Games
Darksteel Plate Deepwoken
Cashtapp Atm Near Me
Daily Voice Tarrytown
Craigslist Free Stuff Greensboro Nc
Gdp E124
Roll Out Gutter Extensions Lowe's
G Switch Unblocked Tyrone
Vanessawest.tripod.com Bundy
Weepinbell Gen 3 Learnset
Nevermore: What Doesn't Kill
Rural King Credit Card Minimum Credit Score
Beverage Lyons Funeral Home Obituaries
Roane County Arrests Today
Kingdom Tattoo Ithaca Mi
Violent Night Showtimes Near Amc Dine-In Menlo Park 12
Mdt Bus Tracker 27
Speedstepper
Busted Mugshots Paducah Ky
Doctors of Optometry - Westchester Mall | Trusted Eye Doctors in White Plains, NY
Mini-Mental State Examination (MMSE) – Strokengine
How rich were the McCallisters in 'Home Alone'? Family's income unveiled
N.J. Hogenkamp Sons Funeral Home | Saint Henry, Ohio
Ucm Black Board
A Grade Ahead Reviews the Book vs. The Movie: Cloudy with a Chance of Meatballs - A Grade Ahead Blog
Wcostream Attack On Titan
Baldur's Gate 3 Dislocated Shoulder
Σινεμά - Τι Ταινίες Παίζουν οι Κινηματογράφοι Σήμερα - Πρόγραμμα 2024 | iathens.gr
Junior / medior handhaver openbare ruimte (BOA) - Gemeente Leiden
Henry County Illuminate
Levothyroxine Ati Template
Ladyva Is She Married
Top 40 Minecraft mods to enhance your gaming experience
Online-Reservierungen - Booqable Vermietungssoftware
Greg Steube Height
Unblocked Games 6X Snow Rider
Slug Menace Rs3
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Wera13X
Causeway Gomovies
Estes4Me Payroll
2121 Gateway Point
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 5803

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.