By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Massive increase in USB malware in first half of 2023
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Massive increase in USB malware in first half of 2023
News

Massive increase in USB malware in first half of 2023

Last updated: 2023/07/13 at 2:18 PM
Security Parrot Editorial Team Published July 13, 2023
Share
SHARE

USB Malware Attacks Have Experienced a Three-Fold Growth

Research team Mandiant has seen USB malware attacks have experienced a three-fold growth. These attacks aim to use a malicious piece of software to make off with classified information.

SOGU Malware

Mandiant, which is part of Google Cloud, highlights two espionage campaigns in a blog post. First of all, the so-called SOGU malware, which according to the company is one of the most common software variants that end up on a PC via a USB drive. This group attacks both state agencies and corporations. Mandiant sees the Chinese TEMP.Hex as the perpetrator, which uses its practices to promote state espionage and economic interests in that country.

SNOWYDRIVE

The second example of Mandiant is SNOWYDRIVE, which creates a backdoor at a target and then controls the remote system. It also tries to move laterally within a company network to have as much access to sensitive data as possible. The group behind it, according to Mandiant, is UNC4698, which is mainly chasing oil and gas companies in Asia.
On a global level, Mandiant sees that the SOGU attacks specifically occur in many places. In addition, Mandiant has mapped out the sectors where the attacks take place. It concerns a broad spectrum, with pharmaceuticals, IT and the energy sector as the main victims.
Unlike a lot of malware that exploits software vulnerabilities, here we are talking about a delivery that relies on a very cooperative victim or attacker being able to physically get to a device. While phishing email also has to cheat a target, USB drives make that persuasion even more difficult. However, there will always be individuals who are uncritical of a drive into their device and launch an .exe, after which a complex software process takes place.
With Sogu, the software copies itself to the C drive and to the directory for the existing flash drive. After that, stolen documents are exfiltrated via HTTP/HTTPS requests. Other options such as file execution, remote desktop sessions and keylogging are conceivable when using the Sogu software.
SNOWYDRIVE works slightly differently: it disguises the files on the local disk in a Kaspersky folder, after which the malware components work together to install a backdoor. Data exfiltration is also possible with this tool, as well as investigation and file deletion. By mimicking other legitimate processes, it avoids detection.
Mandiant does not directly explain why the attacks have increased so drastically, but it may simply be about recently boosted campaigns. The fact that print shops and hotels are extra risky indicates that the attackers will often fail. Anyone who secures their own equipment and does not just put a flash drive in it will therefore be protected from this type of attack a lot faster.

USB Malware Attacks Have Experienced a Three-Fold Growth

Research team Mandiant has seen USB malware attacks experience a three-fold growth in recent times. These attacks are designed to use a malicious piece of software to steal confidential information.

SOGU Malware

Mandiant, which is part of Google Cloud, has highlighted two espionage campaigns in a blog post. The first of these is the SOGU malware, which Mandiant claims is one of the most common software variants that end up on a PC via a USB drive. This group targets both state agencies and corporations, with the Chinese TEMP.Hex being the perpetrator. This group is believed to be using its practices to promote state espionage and economic interests in China.

SNOWYDRIVE

The second example of Mandiant is SNOWYDRIVE, which creates a backdoor at a target and then controls the remote system. It also attempts to move laterally within a company network to gain access to sensitive data. The group behind it, according to Mandiant, is UNC4698, which is mainly targeting oil and gas companies in Asia.
On a global level, Mandiant has observed that SOGU attacks are occurring in many places. In addition, Mandiant has mapped out the sectors where the attacks take place. These include a broad spectrum, with pharmaceuticals, IT and the energy sector being the main victims.
Unlike a lot of malware that exploits software vulnerabilities, USB malware relies on a very cooperative victim or attacker being able to physically get to a device. While phishing email also has to deceive a target, USB drives make that persuasion even more difficult. However, there will always be individuals who are careless when it comes to plugging a drive into their device and launching an .exe, after which a complex software process takes place.
With Sogu, the software copies itself to the C drive and to the directory for the existing flash drive. After that, stolen documents are exfiltrated via HTTP/HTTPS requests. Other options such as file execution, remote desktop sessions and keylogging are also possible when using the Sogu software.
SNOWYDRIVE works slightly differently: it disguises the files on the local disk in a Kaspersky folder, after which the malware components work together to install a backdoor. Data exfiltration is also possible with this tool, as well as investigation and file deletion. By mimicking other legitimate processes, it avoids detection.
Mandiant does not directly explain why the attacks have increased so drastically, but it may simply be due to recently boosted campaigns. The fact that print shops and hotels are extra risky indicates that the attackers will often fail. Anyone who secures their own equipment and does not just put a flash drive in it will therefore be protected from this type of attack much faster.

Weekly Updates For Our Loyal Readers!

Security Parrot Editorial Team July 13, 2023
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?