<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>USB Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/usb/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/usb/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 14:54:35 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>USB Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/usb/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NUI Galway Data Breach &#8211; Lessons learned?</title>
		<link>https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Nov 2018 10:16:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1451</guid>

					<description><![CDATA[<p>The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick may have had personal data on 5% of the student population. This 5% of an 18,000 student population&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1456" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg" alt="nui galway data breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. <span id="more-1451"></span>If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick <em><strong>may</strong></em> have had personal data on 5% of the student population. This 5% of an 18,000 student population gives us approximately 900 individuals being impacted by this breach. That personal data <em><strong>may</strong></em> have included exam results, as reported <a href="https://www.independent.ie/irish-news/news/university-at-centre-of-potential-data-breach-after-usb-stick-goes-missing-37542617.html" target="_blank" rel="noopener">by the Irish Independent</a>.</p>
<blockquote><p>While the University is unclear on the contents of the portable device, it may have held a file containing names of approximately 5% of the student body, their student number and exam results.</p></blockquote>
<p>It&#8217;s the uncertainty that is most worrying to me. Also their claim that they have strict policies in place relating to portable devices is a bit disingenuous. I&#8217;ve been through <a href="http://www.nuigalway.ie/about-us/office-secretary/policies-procedures/" target="_blank" rel="noopener">the policies</a> and also looked at their <a href="http://www.nuigalway.ie/data-protection/" target="_blank" rel="noopener">data protection section</a> and found some conflicting direction with regard to data handling and USB memory sticks.</p>
<p>The <a href="http://www.nuigalway.ie/media/oifiganrunai/files/QA401-Data-Handling.pdf" target="_blank" rel="noopener">Data Handling Policy</a> states the following about &#8220;NUI Galway Highly Restricted&#8221; data:</p>
<blockquote><p>Storage of this data outside of the source system, for example on a laptop or memory stick; must be approved by the data owner. Where data is held outside the source system it must be encrypted.</p></blockquote>
<p>That seems quite sensible, as approval would mean that somebody would know exactly what data is on there and it would then be encrypted. However their <a href="http://www.nuigalway.ie/media/informationsolutionsservices/files/ictpolicies/QA409_encryption-policy.pdf" target="_blank" rel="noopener">Encryption policy</a>, has something else to say on USB memory sticks:</p>
<blockquote><p>Portable storage capability such as DVD’s, CD’s and USB flash drives should not be utilised for classified data storage or transfer, even in an encrypted format.</p></blockquote>
<p>So the handling policy says it&#8217;s fine, but the encryption policy says no. It&#8217;s obvious that the data handling policy wasn&#8217;t followed with this data breach.</p>
<p>I thought it interesting that they have plenty on their site for how to use USB memory sticks and the <a href="http://www.nuigalway.ie/information-solutions-services/servicesforstaff/pcsuites/usbstorage/" target="_blank" rel="noopener">protections they have in place</a>.</p>
<blockquote><p>ISS have <strong>disabled Autorun</strong> on the all computers in the PC Suites as a precautionary measure to prevent the spread of viruses.  When autorun is disabled, a USB memory stick or software on a CD or DVD will no longer automatically start when inserted.</p></blockquote>
<p>So that&#8217;s great &#8230; lots of protection there &#8230; or maybe not. What if the USB device impersonated a keyboard? It could inject keystrokes that open up a command line, execute a command to download dodgy software and execute it. <a href="https://www.howtogeek.com/203061/don%E2%80%99t-panic-but-all-usb-devices-have-a-massive-security-problem/" target="_blank" rel="noopener">I&#8217;m not making this up</a>. The USB stick could also fry the electronics on your computer. Again <a href="https://www.l2cybersecurity.com/usb-machine-killer/" target="_blank" rel="noopener">this is something that happens</a>.</p>
<p>These USB memory sticks are such a problem from a data breach perspective that I always recommend companies and organisations to either block them completely or put in place a solution that automatically encrypts all data on them.</p>
<p>I did dedicate <a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">an entire commandment</a> to USB memory sticks. So you can get my deeply held views in there.</p>
<p>The NUI Galway data breach was an embarrassment for the University. I don&#8217;t think the exam results could be classified as sensitive personal data (special category). But I&#8217;m sure students wouldn&#8217;t like these been released publicly. As long as the powers that be learn a lesson from this sorry situation and implement more rigorous technical solutions, then it will hopefully prevent future, larger and more sanction-worthy breaches.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Heathrow&#8217;s dangerous data breach</title>
		<link>https://www.l2cybersecurity.com/heathrows-dangerous-data-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 01 Nov 2017 15:29:54 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=967</guid>

					<description><![CDATA[<p>You may not have heard about this, as it emerged on Sunday. There was a data breach relating to Heathrow Airport. A fully accessible USB memory stick was found on a London street. This memory stick had some 2.5 Gigabytes of data on it, in 174 documents. All of the documents were readable. Some were&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/heathrows-dangerous-data-breach/">Heathrow&#8217;s dangerous data breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-2867" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Heathrow-Data-Breach-150x150.jpg" alt="Heathrow Data Breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Heathrow-Data-Breach-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/Heathrow-Data-Breach.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />You may not have heard about this, as it emerged on Sunday. There was a data breach relating to Heathrow Airport. A fully accessible USB memory stick was found <a href="http://www.bbc.com/news/uk-41792995">on a London street</a>. <span id="more-967"></span>This memory stick had some 2.5 Gigabytes of data on it, in 174 documents. All of the documents were readable. Some were marked confidential.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The following was the type of data on the memory stick:</p>
<ul>
<li>Routes through the airport and security measures for royalty and VIPs</li>
<li>Security patrol timing</li>
<li>Locations of CCTV cameras</li>
<li>Types of ID card required for different areas</li>
<li>Escape routes for the Heathrow Express railway line</li>
<li>Details of the ultrasound detection system that protects the perimeter fence</li>
</ul>
<p>Just like the Swedish Government&#8217;s data breach (the third story in <a href="https://www.l2cybersecurity.com/data-breach-handling-3-recent-examples/">this post</a>), this sort of information, falling into the wrong hands is incredibly dangerous and could have cost people their lives. I don&#8217;t say this to be hyperbolic. If a terrorist organisation got their hands on this data, they could have planned a highly effective attack on Heathrow.</p>
<p>It is plain madness that it was possible for the information to be placed onto the USB memory stick in the first place. For an organisation that has to consider likely terrorist threats, they should have the strictest information security measures in place. There are easily implemented technical solutions to prevent use of unauthorised USB devices. These solutions can also be set to automatically encrypt any information that is stored on authorised USB devices.</p>
<p>Heathrow Airport authorities are obviously investigating this incident. Perhaps they do have these type of solutions in place and that it might emerge that it was an external contractor what done it. Sometimes when external contractors are brought in to do specific pieces of work, their laptops might not have the same security measures applied as would be the case for an employee. In scenarios where you are dealing with the security of people&#8217;s lives, you need to have the strictest policies and procedures applied to all who work on it.</p>
<p>As a final comment, the person who found the USB memory stick on the street was wise enough to plug it into a computer in a library rather than their own home PC or Laptop. Maybe they had read <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/">Commandment 9</a> <span id="c128" class="notranslate">and didn&#8217;t want to risk potentially infecting their personal equipment. ?</span></p>
<p>The post <a href="https://www.l2cybersecurity.com/heathrows-dangerous-data-breach/">Heathrow&#8217;s dangerous data breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Ophelia taught me about power.</title>
		<link>https://www.l2cybersecurity.com/what-ophelia-taught-me-about-power/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 19 Oct 2017 10:54:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Business Interruption]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=956</guid>

					<description><![CDATA[<p>Hurricane Ophelia came to Ireland this week and caused quite a lot of damage across the country. Trees were blown down. Roofs were ripped off. The electrical power supply grid was widely disrupted. The area where my office is, had no power for over 48 hours. I was very impressed at getting the supply restored&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/what-ophelia-taught-me-about-power/">What Ophelia taught me about power.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-957" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/phone-chargers-150x150.jpg" alt="Power cables" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/phone-chargers-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/10/phone-chargers.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Hurricane Ophelia came to Ireland this week and caused quite a lot of damage across the country. Trees were blown down. Roofs were ripped off. The electrical power supply grid was widely disrupted. The area where my office is, had no power for over 48 hours. <span id="more-956"></span>I was very impressed at getting the supply restored so quickly. When <a href="http://www.irishexaminer.com/ireland/storm-darwin-hurricane-gusts-mass-destruction-widespread-blackouts-and-not-one-person-seriously-injured-258663.html">Storm Darwin</a> hit on February 12 2014, there was no power supply for 6 days and after a few hours, it was gone again for another 2 days. So it&#8217;s a big thumbs up from me for ESB Networks getting me back operational so quickly.</p>
<p>Since we were warned so far in advance about Ophelia, I made sure to be as prepared as possible. I charged up my supply of rechargeable batteries for torches and the radio. I made backups to the cloud regularly throughout the morning of 16th October. I kept my phones on charge as well. When the power finally went out and I was running on Uninterruptible Power Supply (UPS), I made one last backup to an external disk. I then shut everything off and waited out the storm.</p>
<p>One of the problems of being in a rural area, is there are very few mobile network cells serving the area. A couple of hours after the power went out I lost coverage from Vodafone. I only had &#8220;Emergency calls only&#8221; showing for service, which mean&#8217;s some other provider was still operational. That didn&#8217;t last long and I had &#8220;No Service&#8221; by Monday evening. It was this that caused me a little problem. The battery on my phones seemed to drain a lot more quickly. I got a low battery warning on my personal Samsung Galaxy S4 (elderly, but dependable) by 9:00pm. It should have lasted until the following afternoon. Perhaps it was using up power trying to find a network to connect to.<br />
<img loading="lazy" decoding="async" class="alignright size-full wp-image-958" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Cigarette-USB.jpg" alt="" width="150" height="150" /></p>
<p>I wasn&#8217;t concerned, as I knew I had one of these car cigarette lighter USB gizmos in the car. So I switched the phone to Flight Mode (to stop it looking for non existent networks), went out the car with my USB charging cable, opened the glove box and &#8230; nothing! There was only the car manual and a spare headlight bulb. Then I remembered. Last year, I&#8217;d given a loan of it to a friend who was going on a touring holiday in Europe. He had forgotten to give it back to me.</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-959" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/USB-Power.jpg" alt="" width="150" height="90" />Fortunately I remembered that I happened to have one of these little USB power packs, which I had charged over the weekend. So that saved my Samsung. My business phone, a Google Nexus 6P, was in better shape battery wise when I switched it to Flight Mode. I was confident of it lasting until I got to my alternate location the following morning. However it raised a question in my mind. Would I be able to use that same USB power pack to charge my Nexus, if I needed to?</p>
<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-961" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/USB-C.png" alt="" width="150" height="91" /></p>
<p>The answer is no. It&#8217;s not a power issue either. It&#8217;s to do with the type of cable. The Nexus charging port is a USB Type-C and both ends of it&#8217;s charging cable are just the same. So I have nothing, other than it&#8217;s three-pin adapter, that I could use to charge my Nexus with.</p>
<p>&nbsp;</p>
<p>On Tuesday morning, as I was en-route to work in an alternate location I picked up a USB Type-A to USB Type-C cable to be able to use the battery pack or my laptop. I also got a 300 Watt inverter (below), that I could connect to my car&#8217;s battery and get a 3 pin plug socket, which I could connect an extension lead to and then have enough juice inside the house to run my laptop and charge both phones at the same time.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-962" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Inverter.jpg" alt="" width="300" height="338" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Inverter.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Inverter-266x300.jpg 266w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>I&#8217;m very fortunate that I can run my business with just my laptop and mobile phone. I&#8217;m also pretty well prepared from a <a href="https://www.l2cybersecurity.com/#ourservices">Business Continuity</a> perspective. However the real life test that came with Hurricane Ophelia highlighted that I made an <span style="text-decoration: underline;"><strong>assumption</strong></span> that I could power my mobile phones from my car, when I could do no such thing.</p>
<p>The lessons learnt here are:</p>
<ol>
<li>When you are preparing for a business disrupting event, <span style="text-decoration: underline;"><strong>check everything</strong></span>! Do not assume that something is where you left it.</li>
<li>Have alternate methods of charging mobile devices where possible, particularly if they have different types of cables.</li>
<li>Finally, if something forms part of your business recovery plan, don&#8217;t give it on loan to your friends</li>
</ol>
<p>Be prepared.</p>
<p>The post <a href="https://www.l2cybersecurity.com/what-ophelia-taught-me-about-power/">What Ophelia taught me about power.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Snail mail delivers USB keys &#8230; WTF?</title>
		<link>https://www.l2cybersecurity.com/usb-key-malware-postal-delivery/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Sep 2016 00:09:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=561</guid>

					<description><![CDATA[<p>I find I&#8217;m writing a second article about Evil USBs within a week. At least these ones don&#8217;t destroy your equipment, but they might infect you with nasty software that does things that you really wouldn&#8217;t want it doing. In this case, in Victoria, Australia, Evil Doers were dropping USB drives into people&#8217;s mailboxes. The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/usb-key-malware-postal-delivery/">Snail mail delivers USB keys &#8230; WTF?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="http://assets.amuniversal.com/0601c830b0bd012e2f8800163e41dd5b" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fassets.amuniversal.com%2F0601c830b0bd012e2f8800163e41dd5b&amp;container=blogger&amp;gadget=a&amp;rewriteMime=image%2F*" alt="Dilbert dirty USB key" width="587" height="185" border="0" data-orig-src="http://assets.amuniversal.com/0601c830b0bd012e2f8800163e41dd5b" /></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">I find I&#8217;m writing a second article about Evil USBs within a week. At least these ones don&#8217;t <a href="http://www.l2cybersecurity.com/usb-machine-killer/" data-blogger-escaped-target="_blank">destroy your equipment</a>, but they might infect you with nasty software that does things that you really wouldn&#8217;t want it doing.</span></p>
</div>
<div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">In this case, in Victoria, Australia, Evil Doers were dropping USB drives into people&#8217;s mailboxes. The <a href="https://www.vicpolicenews.com.au/news/harmful-usb-drives-found-in-letterboxes" data-blogger-escaped-target="_blank">report from Victoria Police</a> stated:</span></p>
</div>
<blockquote class="tr_bq">
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Upon inserting the USB drives into their computers victims have experienced fraudulent media streaming service offers, as well as other <b>serious issues</b>.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">The USB drives are believed to be extremely harmful and members of the public are urged to avoid plugging them into their computers or other devices.</span></p>
</div>
</blockquote>
<div data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">That reference to other serious issues, is quite likely a Ransomware incident, where all of the files and folders on the victim&#8217;s machine gets scrambled and they have to pay the bad guys good money to get their data back.</span></div>
</div>
<p><span id="more-561"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">A <a href="https://cdn.elie.net/publications/users-really-do-plug-in-USB-drives-they-find.pdf" data-blogger-escaped-target="_blank">2015 study</a> conducted by a group of researchers from the University of Illinois, the University of Michigan and Google revealed that nearly half of people would not only plug a USB drive they&#8217;ve found on the ground into their PCs, but would also open files and click on unfamiliar links.</span></p>
</div>
<div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Now in this study&#8217;s case, the USB sticks were dropped on the ground and people&#8217;s reasoning behind accessing the memory sticks was generally for the altruistic purpose of identifying it&#8217;s owner in order to return the device to them.</span></p>
</div>
<div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">In this new case in Australia, the devices come wrapped in plastic, so would appear to be brand new devices, just left in by some generous benefactor. </span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://www.vicpolicenews.com.au/sites/default/files/usbs.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://www.vicpolicenews.com.au/sites/default/files/usbs.jpg" width="320" height="238" border="0" /></a> <span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Look folks, it really is simple. As I stated in my <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" data-blogger-escaped-target="_blank">9th Commandment</a> &#8211; <span data-blogger-escaped-style="line-height: 107%;">Thou shalt never insert nor allow to be inserted, a USB memory stick that thy hath never had complete control of since it was removed from its packaging.</span></span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;"><span data-blogger-escaped-style="line-height: 107%;"><br />
</span></span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Now in this case you could be forgiven for thinking they are still in their packaging. The packaging I refer to was coming from a retail or on-line store.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">But really, somebody is just going to drop a USB memory stick in your mailbox because &#8230; what &#8230;</span></p>
<ul>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">You&#8217;re a good customer? (of whom?)</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">You deserve it? (why?)</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">It was a mistake (it wasn&#8217;t!)</span></li>
</ul>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">You don&#8217;t get stuff for free without a good reason. Just fu&#8230; fire this stuff in the bin and get on with your life.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">And let&#8217;s be careful out there.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/usb-key-malware-postal-delivery/">Snail mail delivers USB keys &#8230; WTF?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A desktop/laptop killing USB device is on sale for €50.</title>
		<link>https://www.l2cybersecurity.com/usb-machine-killer/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 16 Sep 2016 10:50:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=558</guid>

					<description><![CDATA[<p>As I&#8217;d mentioned in the detail section of a previous blog post there was a prototype USB memory stick that is designed to fry the electronics on a laptop or desktop, the instant it gets plugged into it. Well it&#8217;s now something you can buy for as little as €50. The worrying thing is, as&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/usb-machine-killer/">A desktop/laptop killing USB device is on sale for €50.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">As I&#8217;d mentioned in the detail section of a <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" data-blogger-escaped-target="_blank">previous blog post</a> there was a prototype USB memory stick that is designed to fry the electronics on a laptop or desktop, the instant it gets plugged into it.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Well it&#8217;s now <a href="http://www.tomshardware.com/news/usb-killer-2.0-power-surge-attack,32669.html" data-blogger-escaped-target="_blank">something you can buy</a> for as little as €50. The worrying thing is, as of today (16th September 2016) they are out of stock!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">What purpose does this device serve? </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">According to their website &#8220;The USB Kill 2.0 is a testing device created to test USB ports against power surge attacks. The USB Kill 2.0 tests your device&#8217;s resistance against this attack.&#8221; Unfortunately in testing your device, this stick literally kills it!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">They separately sell a &#8220;Tester Shield&#8221;, which you plug into your PC&#8217;s USB port, before inserting the killer device. This stops your machine from being fried. If, as they claim their reason behind releasing this device is to test your PC&#8217;s resistance to a surge attack, then why don&#8217;t they have a single combined shield/killer stick that does the test, but without killing the victim machine?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">It&#8217;s simple &#8211; they know that nobody would buy such a combined unit, because I don&#8217;t expect many people would actually carry out such a test. However they may be very interested in being a malicious thug and go about killing people&#8217;s machines.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">Interestingly Apple devices appear to be immune to this, as they have their USB ports wired differently to the way the rest of the world seems to have them wired. So if other manufacturers make the change to prevent such a device being effective, this will take several years to wash through, such that you end up with a desktop or laptop that is not vulnerable to this type of attack.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">So as I mentioned in my original blog post, never insert a USB stick into your machine, unless you have had it in your control since the day you removed it from it&#8217;s packaging. Don&#8217;t let anybody else insert a USB stick into your machine &#8211; even your IT folk &#8211; especially your IT folk. You just never know where it&#8217;s been.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: Verdana, sans-serif;">But keep a special lookout for this little beauty!</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-WDGD0kc5UCI/V9vMbGU1FDI/AAAAAAAAAY0/r63MKO_W9-IW_gxrTOZKGklzAH6SMfe6wCEw/s1600/USBkill.JPG" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img decoding="async" src="https://1.bp.blogspot.com/-WDGD0kc5UCI/V9vMbGU1FDI/AAAAAAAAAY0/r63MKO_W9-IW_gxrTOZKGklzAH6SMfe6wCEw/s1600/USBkill.JPG" border="0" /></a></p>
<p>The post <a href="https://www.l2cybersecurity.com/usb-machine-killer/">A desktop/laptop killing USB device is on sale for €50.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
