• About
  • Advertise
  • Privacy & Policy
  • Contact
KHUYEN.INFO
  • Tech News
  • Malware
  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed
No Result
View All Result
  • Tech News
  • Malware
  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed
No Result
View All Result
KHUYEN.INFO
No Result
View All Result

Beware Of Removable Media Place In Cyber Crime

admin by admin
April 21, 2022
Home Cyber Attacks
Share on FacebookShare on Twitter

Even something as big as a global meeting of nations could have its share of cyber mischief, and innocent-looking USB thumb drives and smartphone rechargers could be the crime tools. Not all malicious threats are clear to notice as DDoS (distributed denial of service). The G20 Summit was held in St. Petersburg on September 5-6, 2013 with a group of finance ministers and central bank governors of 19 countries and the European Union. Specifically, they were Argentina, Australia, Brazil, Canada, China, France, Germany, India, Indonesia, Italy, Japan, the Republic of Korea, Mexico, Russia, Saudi Arabia, South Africa, Turkey, the United Kingdom, the United States of America and the European Union, represented by the President of the European Council and by Head of the European Central Bank. Russia took the G20 presidency on December 1, 2012, a first for the country. The major categories of thought and planning are Business 20, Think 20, Civil 20, Youth 20 and Labor 20.

At the September 2013 summit, heads of state and their teams were given USB thumb drives with the ability to copy sensitive data from the laptops that they were inserted in. Reports also noted that the representatives received smartphone recharger gifts that could have covertly looked at their emails, SMS and phone calls. Was anyone purposefully trying to spy on the G20 participants? If so, who was responsible?

The “spying” campaign was first noticed by Herman Van Rompuy, the President of the European Council, noted the Italian newspaper Corriere della Sera. It covered the story on its front page. Mr. Van Rompuy ordered analysis of the USB pen drives and other devices by both intelligence experts in Brussels and Germany’s secret service. The Brussels component declared that the allegations were not true and that there was nothing wrong with the gift devices.

How can thumb drives and smartphone chargers be used to hack devices that access the Internet? In fact, they are responsible for some cyber attacks offline! Kaspersksy noted in August 2013 that it is “becoming more and more common for attackers to find new ways to infiltrate your devices, like through your removable media.” Removable media includes readers, writers, and drives.

Every optical disc (Blue-ray disc, DVD, CD), memory card (CompactFlash card, Secure Digital card, Memory Stick), floppy disk, zip disk, magnetic tape, disk packs, VHS tape, USB flash drive (also called ), external hard disk, digital camera, printer, smart phone and other external or dockable peripheral that are easily removed or inserted into a system is removable media. They all are capable of infecting, copying, and spying on the system and network if they have the right compromising file on them. If they can store media, that media could be a malicious threat.

Some best practices to use when using USB thumb drives or other removable media:

1. Set up automation of scans the second items are plugged into a device.

2. Regularly update device OS (operating systems). Updates are available for Mac, Windows, Android, Linux and other operating systems. Set up the updates to occur automatically or to even do so manually at least once per day.

3. Know what is behind the Facebook, Twitter or other social network chat, wall, timeline or private message attachments and links. One good tip is to hold one’s mouse over the link without clicking to see a preview of what is there.

4. Removable media for personal needs should stay separate from those of crucial business needs. Music and video files that are downloaded from websites, forums and file sharing sites should never be mixed with crucial data.

Keep in mind: even reports on Edward Snowden’s 2013 activities show that he used a flash drive when he downloaded NSA data. The USB stick was also the vehicle of two other famous cyber compromises, the devastating malware, Stuxnet worm, and the data exfiltration vector associated with the Flame virus. The removable data was plugged into a computer, secretly collects data based on certain keywords. The stolen documents are then hidden in a secret folder on the USB drive until it connected to any Internet-enabled computer again. Then, the documents automatically sent to certain IP addresses of the originating perpetrators for their purposes.

Like DDoS attacks, compromising removable media are often a cover for or part of other fraudulent activity such as the stealing of sensitive documents, extortion, and ransom and not just childish mischief.

Tags: cyber attackscyber attacks 2022cyber attacks examplescyber attacks newscyber attacks today
admin

admin

Next Post
The Cyber-Security Training Tips Your Business Has Been Looking For

The Cyber-Security Training Tips Your Business Has Been Looking For

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Invest Your Time, Reap The Benefits

Invest Your Time, Reap The Benefits

April 24, 2022
Rushing Towards Semiconductor Nanowires: New Platform For Ultrafast Transistors

Rushing Towards Semiconductor Nanowires: New Platform For Ultrafast Transistors

April 23, 2022

Trending.

How PIM and BIS work together

Everything You Need To Know About Product Information Management (PIM)

April 24, 2022
Three Provinces, Three Sets Of Rules

E-Invoicing In Spain – Soon To Be Mandatory For B2B Transactions

April 24, 2022
KHUYEN.INFO

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Categories

  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed
  • Malware
  • Tech News

Tags

ActBalancing API Benefits Blog CFDIE Changing coobligatory cyber attacks cyber attacks 2022 cyber attacks examples cyber attacks news cyber attacks today Data data breaches 2021 data breaches are always intentional data breachesdata breaches 2020 data breaches in healthcare data breaches in india data breaches list data breaches must be reported to data controller data subject & data protection authority within Day Digital Focus Germanindustry industryspecific Invest malware attack malware includes viruses worms spyware adware and spam malwaremalware analysis malware meaning malware scan Micro Power Racing Reap Return Role Safely scenarios Smart TechNotes Time TransformationA version Video

Recent News

Recapping Run And Transform | Micro Focus Blog : Micro Focus Blog

Recapping Run And Transform | Micro Focus Blog : Micro Focus Blog

April 24, 2022
Three Provinces, Three Sets Of Rules

B2B E-Invoicing Mandate In Poland By 2022 At The Latest

April 24, 2022
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Tech News
  • Malware
  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.