Category: Threat

  • There is reportedly a new particularly advanced USB-savvy malware being called "USB Thief" (Google Search) being discussed by many in the technology press.   If you allow users (including system admins) to use USB storage devices on air gapped systems then this threat can be a potential attack vector a persistent…

    + , , ,
  • There is a new open source effort to build out a working data exfiltration toolkit using radio frequencies.   The source code has been posted to GitHub.  More info on the news at Softpedia.  The key defensive measure would be to make sure no malicious rogue capabilities make it to your…

    + , , ,
  • Researchers preparing for a future conference presentation have released details (PDF paper here) of their successful electromagnetic (EM) attack against an air gapped system that included no additional software to be previously installed on the system being hacked.  The hardware costs to build the attacking system was around $3000.  The…

    + , , ,
  • The Register published news of a recent presentation by (@ynvb & @oppenheim1) that IP-enabled KVMs can be attacked in such a way to enable access on a closed network (no Internet connectivity).

    + , , ,
  • The United States Department of Defense's definition of an insider threat: An insider threat is defined as someone who uses his or her authorized access to damage the national security of the United States, whether through espionage, terrorism, unauthorized disclosures of classified information, or other harmful actions.

    + ,