Feeds

USB drives pose insider threat

The latest 'Trojan horse'

Securing Web Applications Made Simple and Scalable

In a recent test of a credit union's network security, consultants working for New York-based security audit firm Secure Network Technologies scattered 20 USB flash drives around the financial group's building.

Each memory fob held a program - disguised as an image file - that would collect passwords, user names and information about the user's system. Fifteen of the USB drives were picked up by employees, and surprisingly, all fifteen drives were subsequently plugged into credit union computers.

The test confirmed that employees play a key role in a company's security and that many workers still do not understand the danger of USB drives, said Steve Stasiukonis, vice president and founder of Secure Network Technologies.

"Most companies know that USB devices are a problem," he said. "But to them it's a potential issue. They haven't heard about a lot of people being exploited by such techniques."

Data leaks have become a major issue in the past year, as company after company suffers a laptop theft or a leak caused by poor security.

Fast-spreading internet worms have become less popular among malicious coders in favour of bot software and other attack tools designed to compromise PCs with an eye toward profits. And companies have been specifically targeted by attackers using Trojan horse programs - attached to email, CDs or USB drives - to steal valuable data.

Using removable media to steal data from a company or surreptitiously install rogue programs on corporate computers dates back to the days of magnetic tape drives and floppy disks. Yet, while a writable CD or floppy disk in a coat pocket might raise eyebrows today, USB tokens have become a common accessory, keeping company with car and house keys.

It's no surprise, then, that USB keys have become a popular way to sneak data out from companies. Almost 37 per cent of businesses surveyed by the Yankee Group in 2005 blamed USB drives for contributing to the disclosure of company information. Nearly two thirds of the leaks resulted in some disruption to the business units involved, according to the analyst firm.

Those numbers, as well as the case of the cracked credit union, come as no surprise to Vladamir Chernavsky, CEO of AdvancedForce InfoSecurity Solutions, which sells a security application, called DeviceLock, for protecting USB ports and other device connections on a computer.

"Three years ago, it took us a lot of work to convince people that USB tokens were a security threat," Chernavsky said. "Now, we don't have to struggle to convince people because everyone understands it's an issue."

After analysts flagged iPods as a potential threat, corporate security professionals looked at all removal storage with more suspicion, Chernavsky said. Yet, because USB drives are easy to use and extremely portable, they have become perhaps the most popular choice for transporting modest amounts of data. Moreover, so-called USB smart drives, which add the ability to autorun code stored on the USB memory, allow workers to not only take data with them but also carry around their preferred applications.

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.