Techno

Hackers using malware to steal data from USB flash drives

Internet criminals constantly find new ways To steal your data. Since people are more aware of the common threats such as hunting links, fake websites, fraudulent email messages and suicide fraud, attackers have become more creative in their approach.

One of the modern methods they use includes targeting USB flash drives. It may seem surprising to focus on something simple like a flash drive, but the data it holds can be valuable.

In addition, flash drives can be used to spread harmful programs on other devices.

Stay protected and enlightened! Get security alerts and expert technology advice – Subscribe to the Cyberguy report now

The person who connects a USB flash drive on a laptop computer (Cyberguy “Knutsson)

Why do you target USB flash drives?

USB drives are everywhere in the workplace, especially in environments that contain air -covered systems or restricted internet access, such as those in government and energy sectors. This makes them an easy target for stealing data and spreading harmful programs. Often, tablets store these sensitive files that are not available on network systems.

What is artificial intelligence (AI)?

Upon injury, USB drives can spread Harmful programs Not only within one organization but also via multiple entities if shared. These attacks do not depend on the weaknesses of the network, allowing them to overcome traditional safety tools.

Flash engine hacker 2 tablets

USB drive connected to a laptop computer (Cyberguy “Knutsson)

200 million records for social media were leaked in the main X data breach

How to target infiltrators your USB drives

As mentioned before Sikorillist KasperskyCyber ​​security research platform, infiltrators use USB drives to spread malware in ways that can easily exceed traditional safety systems. One group, known as Goffee, launches its attacks using targeted emails. These emails often have the affected RAR files or office documents with harmful macro units. Once it opens, they install a cover -up Programs like Powermodul and PowerTaskel On the victim’s system.

These tools are not only sitting. They put the basis for more attacks. PowerModul, in particular, plays a big role. It is PowerShell text presented in 2024 and that speaks to the driving and control server (C2). From there, it can download and operate other tools, including two particularly dangerous tools, Flashfilegrabber and USB World.

Flashfilegrabber is manufactured to steal data from USB drives. It can either save the stolen files locally or send them back to the infiltrator server. Then there is a USB worm, which affects any USB drive that finds it using PowerModul, and that driving turns into a tool to spread malware into other systems.

What makes this method effective is that USB drives are often shared between people and offices. That physical movement allows Magistical programs for deployment Even without internet connection. Harmful programs hide the original files on USB and are replaced by harmful, disguised text programs, such as a natural appearance. When someone clicks on one of these, it releases infected infection.

Get Fox Business on the Go by clicking here

Flash engine hacker tablet 3

Clarification of a drunk at work (Cyberguy “Knutsson)

Mescape programs display 3.9 billion passwords in the threat of huge cybersecurity

4 practical ways to stay safe from the target attacks USB

1. Do not connect unknown USB drives: It may seem clear, but this is one of the most common ways that spread harmful programs. If you find a USB driving drive or give you someone you don’t expect, avoid connecting it to your system. The attackers often depend on the curiosity of the human being to obtain harmful programs on your device.

2. Be very careful with email attachments: Gofefee campaigns often begin with deceptive email messages that carry malicious RAR files or desktop documents with macro units. Always check the address of the sender and never open unexpected attachments, especially if they ask you to “enable macro units” or come from unknown contacts. When you are in doubt, be sure through a different channel.

3. Avoid clicking on suspicious links and using a strong anti -virus program: Many attacks like the start of Godfee with emails that look legitimate but have harmful links. These links may lead you to fake login pages or silently harmful programs that determine the stage of USB targeting tools such as PowerModul.

The best way to protect yourself from malicious links that prove harmful programs, which may reach your own information, is to install a strong antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.

4. Wiping USB drives before use: The USB worm affects USB drives by hiding the original files and planting the systematic malicious textures such as shortcuts, which lead to PowerModul when clicking on them. Flashfilegrabber steals the files silently from USBS, and often passes without anyone noticing. Always wipe USB drives using the updated antivirus program before opening any files. Use a respectable safety tool to check hidden textual programs, unusual shortcuts, or unexpected executives. If the renamed files appear or hidden, do not click them until they are verified safe.

Data removal does what VPNS does not do: Here is the reason for both of them

Court Kisa Curt

Internet criminals are flourishing as comfort meets control. However, it is worth thinking that USBS remains a soft goal. It is not only a storage but rather an artifact of workplaces, especially in high risk sectors such as energy or government, as the transfer of non -connected data seems safer than the cloud. But this confidence is a blind spot. Attackers such as Gofeee do not need zero days because they can take advantage of human habits such as sharing drives and overcoming scanning and clicking without thinking.

How many times do you connect a USB drive without wiping first? Let’s know through our writing in Cyberguy.com/contact

Click here to get the Fox News app

For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter

Ask Kurt a question or tell us about the stories you want to cover

Follow Court on his social channels

Answers to the most asked Cyberguy questions:

New from Court:

Copyright 2025 Cyberguy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button