• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Threat Intelligence

USB Key Hacking: A Resurgence in Espionage Tactics

Turla APT cyberspies turn to old-school USB key hacking techniques for cyberespionage operations against Ukraine.

Gert Van de VenbyGert Van de Ven
April 19, 2023
in Articles, Cyber Attacks, Threat Intelligence
0
USB Key Hacking: A Resurgence in Espionage Tactics

In an era of rapidly advancing technology, it’s fascinating to see that some old-school tactics remain effective. A recent cyberespionage operation suspected to be linked to Moscow-based hackers “Turla Group” showcases how USB key hacking has made a comeback, playing a significant role in preparing for a potential invasion of Ukraine. This article delves into the details of this operation, the group behind it, and the continued relevance of USB key attacks.

The Resurgence of USB Key Hacking

The Mandiant cybersecurity researchers reported a detailed account of how Moscow-linked hackers infiltrated a Ukrainian computer using a malicious USB key in December 2021. The operation allowed the hackers to introduce Andromeda, a well-known botnet in the cyber community, and infect hundreds of millions of computers for further malware deployment. This once publicly available botnet, dismantled by Europol in 2017, has been repurposed by Russian intelligence members to target Ukraine.

Turla: A Sophisticated State-Sponsored Threat Actor

Turla, also known as Snake or Uroburos, is the APT group attributed to this operation. Tied to the Russian government, Turla specializes in cyberespionage and has targeted over 500 victims in 45 countries, including government agencies, military entities, and diplomats. The in-depth profiling conducted since January may have allowed the group to identify specific victims and tailor their efforts to collect and exfiltrate strategically valuable information.

The Relevance of USB Key Attacks

With the rise of cloud storage and increased file transfer limits in messaging services, USB key attacks have become somewhat obsolete. However, USB keys still have their uses in sensitive sectors where web-based communication is avoided. A similar hacking campaign was detected by Mandiant, conducted by Chinese hackers in December 2022.

Conclusion

The resurgence of USB key hacking as a cyberespionage tool demonstrates that older techniques still have a place in the modern world of cybersecurity. As threat actors continue to evolve and adapt, it’s crucial for organizations and governments to remain vigilant against all forms of cyberattacks, old and new alike.

Tags: AndromedaBotnetCyberespionageGeopoliticsMandiantRussian intelligenceSnakeTurlaUkraineUroburosUSB key hackingWarfare

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}