USB Device Nightmare Becomes Reality

Nightmares can seem frighteningly real. But as we awake and realize that the dream isn't real we recognize it for what it is ... a nightmare. A little more than a year ago I wrote a column about how malware can be transferred between USB memory devices and a PC. I started that article with a fictional account of attending a conference and using a USB Flash Drive to infect a widely used computer to capture corporate data on attendees' Flash Drives. The technology is easy and described in a number of tutorials cited in the article.

But as a security expert at a large campus in the United States tells the story, my account is no longer fictional: The nightmare has become reality.

"One of the groups on campus hosted a conference at an off-site location, and about 500 of the 1,000 attendees ended up with infected USB drives. They had brought their presentations on the USB drives, and the group hosting the conference had a system (provided by the center that the conference was at) that was used to keep copies of the presentations. Either the system arrived infected or was infected by someone early on in the process, and anyone who stuck a USB drive in the system got a "present" on their drive. The malware was set up to autorun, so the attendees more than likely infected their systems when they got back to their office or home (or both). The malware was not detected by many AV products at the time, including the major players, so that helped the infection spread. It's fairly well detected now."

That incident is not nearly as embarrassing as Telstra's distribution of malware-infected USB drives at this year's AusCERT security conference.

Houston, We Have a Problem
Symantic reported (PDF link) that in the second half of 2007 the percentage of malicious code that was propagated as shared executable files had increased from 14 percent to 40 percent as a result of the increased use of removable media. (More than 120 million USB flash drives are purchased every year.) ESET, a security firm, estimated that more than 10 percent of all malware detected in March of 2008 was designed to use portable storage media such as USB drives.

Attack Strategies
The attacks follow two general strategies. The first exploits the "autorun" feature in Windows and the U3 feature on some smart drives to allow a program to run automatically when a removable drive is inserted into a computer. That was the strategy used in my 2007 article.

The problem isn't just U3-capable flash drives, however. A second strategy embeds malware disguised as a normal file on a USB device and makes use of social engineering to cause the user to open the file. This bypasses the fact the "autorun" won't work with "regular" USB flash drives. And as you might expect, there is a tutorial on the Internet, How To: Quick Intro to Hacking Autorun for USB Flash Drives, that describes how to install a user defined program named "Fun Game" on a normal USB flash drive. This was the technique used by a network security firm to audit the security of a client bank. They scattered 20 USB flash drives in locations such as the bank parking lot where they might be found by the client's employees. 15 were picked up by employees who then executed embedded files on bank computers, which then transmitted sensitive bank information back to the security firm.

Not Just a Higher Ed Problem
Higher Education is not alone in dealing with this problem. Because of a rapidly spreading worm (Agent.btz, a varient of SillyFDC) the U.S. Defense Department last month suspended the use of thumb drives, CDs, flash media cards, and all other removable data storage devices from their networks in an effort to halt the spread. The edict, which was reported to come from the commander of U.S. Strategic Command, applies to both the secret SIPRNet and unclassified NIPRNet and directs users to "cease usage of all USB storage media until the USB devices are properly scanned and determined to be free of malware." According to Ryan Olson, director of rapid response for the iDefense computer security firm, "The USB ban should be effective in stopping the worm."

Higher Education Responses
While many campuses are relying on aggressive anti-malware policies for desktop protection, others are addressing the problem by trying to make sure that the USB devices themselves are clean. Cornell is a proponent of this strategy. After their security office detected a serious, widespread malware outbreak with the potential to infect all Windows computers on campus, they initiated "walk-in clinics" for cleaning USB devices. They found that one in every six USB devices checked at the clinics was infected! For the technically inclined they have posted instructions on how to check and clean a USB device as well as how to disable Windows Autorun.

Recommendations
The US-CERT (Computer Emergency Response Team) issued a warning Nov. 20 that malware was increasingly propagating via USB flash drive devices and described the common attack vectors. They encouraged users to do the following to help mitigate the risks:


While a number of vendors, such as IronKey, are developing secure USB memory devices, they are unlikely to be adopted by most of our faculty and students owing to cost. This means that we must rely on the recommendations of the CERT and aggressive campus education programs.

Featured

  • glowing brain, connected circuits, and abstract representations of a book and graduation cap on a light gray gradient background

    Snowflake Launches Program to Upskill 100,000 People in Data and AI

    Cloud data platform Snowflake is embarking on an effort to train and certify more than 100,000 users on its AI Data Cloud by 2027. The One Million Minds + One Platform program will provide Snowflake-delivered courses, training materials, and free access to Snowflake software, at no cost to learners.

  • two abstract humanoid figures made of interconnected lines and polygons, glowing slightly against a dark gradient background

    Microsoft Introduces Copilot Chat Agents for Education

    Microsoft recently announced Microsoft 365 Copilot Chat, a new pay-as-you-go offering that adds AI agents to its existing free chat tool for Microsoft 365 education customers.

  • hand touching glowing connected dots

    Registration Now Open for Tech Tactics in Education: Thriving in the Age of AI

    Tech Tactics in Education has officially opened registration for its May 7 virtual conference on "Thriving in the Age of AI." The annual event, brought to you by the producers of Campus Technology and THE Journal, offers hands-on learning and interactive discussions on the most critical technology issues and practices across K–12 and higher education.

  • Three cubes of noticeably increasing sizes are arranged in a straight row on a subtle abstract background

    A Sense of Scale

    Gardner Campbell explores the notion of scale in education and shares some of his own experience "playing with scale" — scaling up and/or scaling down — in an English course at VCU.