New Security Threat: USB Sticks

One of the major setbacks to the exciting evolution of technology is that exciting developments mean there are always security issues cropping up. It can be a seemingly uphill battle to keep your systems secure. One of the best ways to ensure that your systems are not breached is to keep yourself educated about security threats, as well as adopt specialist help from a trusted IT source.

Did you know that there is a new threat that capitalizes on USB ports that could be infecting your system?

While USB threats aren’t anything new – USB thumb drives are well known to be used by some employees to copy and take important files with them when they leave the office – this latest threat is a little different. Hackers have developed a USB stick that can bypass Windows Autorun features and infect your system.

How do these drives work? As you may have noticed, when you connect a device like an external hard drive to your computer via the USB port, Windows will not run or open the drive. Instead, you will get a window with a number of options, including: Open folder to view files, Download pictures, Play files, etc. The reason for this is because hackers figured out a number of years ago how to put a virus on a USB stick, which when plugged into the computer, would be auto run (started up) by Windows and infect the system.

Hackers have recently figured out how to trick this feature. What they have done is create a flash drive that looks like a USB memory stick only, when you plug it into a computer, Windows thinks it’s a plug-and-play peripheral like a keyboard and will allow it to run. There is memory on the stick where hackers can write and store a virus or infection, which will then run, infecting the system.

There are four things to be aware of with these drives:

  1. They are cheap (ish) – These drives can be found on the Internet for less than USD$65, with some being as cheap as USD$40.
  2. They are fast – Some of these devices are able to run a script and infect a system in 50 seconds, and if they are re-mounted in the same system, could run a script within 30 seconds.
  3. They are multi system compatible – A few of these devices are advertised as being able to infect almost any system – Windows, Mac and Linux.
  4. They aren’t easy to find – yet. While there are websites online advertising these drives, most users won’t be able to find them. Experienced hackers on the other hand can do. Of course, anyone with enough patience can probably find them.

What does this mean for my company? Because these devices are nearly indistinguishable from real memory drives, it is nearly impossible to spot and therefore stop them from infecting systems. Because these drives are currently hard to find and infection rates are generally low, many companies probably don’t have to worry too much. However, you can bet that these drives will probably become more popular in the near future.

This doesn’t mean that you don’t have to be aware of this risk and understand that these drives exist. Some companies have started to take action by disabling USB drives, monitoring what employees plug into their drives and even providing employees with tamper-proof USB drives.

One thing you might have to concern yourself with is if you allow employees to bring in their own drives. In general, if you take steps to ensure that the drives being used are legitimate and approved by the company, this shouldn’t be much of a problem. Of course, keeping your security systems and anti-virus scanners up to date and functioning is always a good idea.

If you would like to learn more about this security threat and what you can do to stop it, we encourage you to attend our upcoming webinar, “Viruses, Malware, and Phishing, Oh My!” where we will be going over the most popular threats out there and more importantly, how to protect yourself. Sign up here!


WAMS, Inc.

The experts at WAMS, Inc. all have a background in the legal industry and understand the software and the demands that come along with it. That’s why all our clients receive a dedicated account manager and engineer with specific planning that works for your business needs. We didn’t break into the tech world to pinch pennies from clients. We go into every partnership to help their business scale gracefully. Your company growth is our company growth, always.