USB Thief — Self-projecting USB Trojan Is Here To Give You Nightmares
Security researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving its trace. The malware uses a unique method of protecting itself with AES128-encryption and renaming the files in each new instance.
Imagine
a malware that spreads through USB drives, steals your computer’s data
and goes undetected. Sounds like a bitter pill to swallow? Well,
security researchers have spotted this unique data-stealing trojan in
the wild that comes with self-protection mechanism that protects it from
being reproduced or copied.
The researchers at ESET security firm have unveiled the fact that Win32/PSW.Stealer.NAI
malware, or USB Thief, can attack the isolated or air-gapped computers.
Each attack of this malware relies on a USB device and it leaves no
evidence on its target.How does USB Thief spread in the wild?
Instead of spreading via the tried-and-tested techniques of autorun files and shortcuts to run itself, USB Thief uses another technique that involves using itself in the portable versions of popular application like NotePad++, Firefox web browser, and TrueCrypt on thumb drives.This queer fish takes advantage of this disguise and finds home in the command chain of such applications in the form of a dynamically linked library or a plugin. As a result, whenever the target runs the applications, the malware also runs in the background.
The protection mechanism of USB Thief
The USB Thief malware contains six files — four executables and two containing configuration data. Talking about its self-protection techniques, the malware uses two methods:- Some of the files are protected by AES128-encryption.
- The filenames are generated with some cryptographic jugglery that makes the filenames different for every instance of malware.
No comments:
Post a Comment