USB THIEF





The Researchers at ESET have found a data - stealing USB Trojan which leaves no trace on the compromised system. Nicknamed as USB Thief (detected as Win32/PSW.Stealer.NAI trojan), this is the most complex trojan ever discovered, it uses encryption and self-protection procedures to infect and hide.

The trojan binds on the USB stick using the USB drive's details as an encryption key using  AES 128 encryption. If the trojan is copied to another USB, the encryption breaks  and the content cannot be determined.

The malware injects itself as a plugin or a dynamically linked library (DLL) file. When the victim launches the app from an infected USB, the Trojan starts executing in the background.
As the malware is executed using a USB device, it does not leave any trace on the machine.

The Trojan consists of six files. Four files are executables and the other two contain the configuration data. To protect it from reverse engineering, it uses two techniques.

1.     Some files are AES128-encrypted.
2.     Their filenames are generated from some cryptographic elements.

This can also be packed as some applications  on  USBs such as Firefox, Chrome, TrueCrypt, Notepad++ .

The attacker deliver the Trojan as a plugin or some apps and let the target carry the Trojan into the air-gapped systems and use it.

When the app or the plugin is launched, the Trojan is executed.



Comments

Popular posts from this blog

INSTALL TIGHTVNC ON KALI LINUX RASPBERRY PI

ENABLE AUTOSTART FOR X11VNC

INSTALL X11VNC ON KALI LINUX RASPBERRY PI