Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Cybercriminals continually develop new tactics to compromise sensitive information. As individuals become more aware of conventional threats like phishing scams and fake websites, these attackers evolve, using innovative methods to evade detection and infiltrate systems.
One such alarming technique recently identified involves the targeting of USB flash drives. It may come as a surprise that something as seemingly straightforward as a USB drive could be the focus of digital thieves, yet the information they store presents a highly valuable asset.
Moreover, these drives serve as vectors for distributing malware to other devices, amplifying the threat.
USB drives are commonplace in numerous workplaces, particularly in environments characterized by air-gapped systems or limited internet access, such as government agencies and energy sectors. These operational settings render USB drives an effortless target for theft and malware distribution, as they often contain sensitive files unavailable on networked systems.
Once a USB drive becomes infected, the malware contained within can proliferate not only within a single organization but also across various entities when shared. Notably, these attacks can circumvent traditional security measures by avoiding reliance on network vulnerabilities.
Kaspersky’s Securelist has reported on a hacking group known as GOFFEE, which adeptly employs USB drives to disseminate malware in ways that exploit conventional security frameworks. Their operations often commence with targeted phishing emails laden with infected attachments like RAR files or malicious Office documents containing harmful macros. When victims inadvertently open these files, nasty programs such as PowerModul and PowerTaskel find their way onto their systems.
Once on the victim’s machine, these tools go into action. PowerModul, specifically, is a PowerShell script introduced in 2024 designed to communicate with a command-and-control (C2) server. This connection allows it to download and execute additional malicious software, including the particularly dangerous FlashFileGrabber and USB Worm.
FlashFileGrabber is engineered to pilfer data from USB drives, either storing the stolen files locally or funneling them back to the hacker’s server. The USB Worm, on the other hand, infects any USB drive it encounters with PowerModul, turning these devices into vehicles for further malware distribution.
The efficacy of this approach stems from the rampant sharing of USB drives among users and workplaces. This physical transfer facilitates the spread of malware without requiring an internet connection. The malicious software cleverly conceals original files on a USB drive, replacing them with deceptive scripts that resemble standard shortcuts. Clicking on one of these seemingly innocuous shortcuts activates the infection process, compromising the user’s machine.
To protect against these threats, individuals should adopt several strategies: