Security Alerts & News
by Tymoteusz A. Góral

#1382 Meet USBee, the malware that uses USB drives to covertly jump airgaps
In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB device allowed spies to surreptitiously siphon data out of targeted computers, even when they were physically severed from the Internet or other networks. Now, researchers have developed software that goes a step further by turning unmodified USB devices into covert transmitters that can funnel large amounts of information out of similarly "air-gapped" PCs.

The USBee—so named because it behaves like a bee that flies through the air taking bits from one place to another—is in many respects a significant improvement over the NSA-developed USB exfiltrator known as CottonMouth. That tool had to be outfitted with a hardware implant in advance and then required someone to smuggle it into the facility housing the locked-down computer being targeted. USBee, by contrast, turns USB devices already inside the targeted facility into a transmitter with no hardware modification required at all.
Read more
#1387 BASHLITE family of malware infects 1 million IoT devices
#1386 Officials blame “sophisticated” Russian hackers for voter system attacks
#1385 How tech is helping a casino catch the cheats (VIDEO)
#1384 Locky ransomware now downloaded as encrypted DLLs
#1383 FBI detects breaches in US state voting systems
#1382 Meet USBee, the malware that uses USB drives to covertly jump airgaps
#1381 Cyber security should be expanded to other departments other than IT: CII-KPMG report
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12