MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
secret
Search

Secret Service learns why you don't plug strange USB drives into computers

Tuesday April 9, 2019. 03:42 PM , from BoingBoing
After collaring a woman who got past security at Mar-a-Lago (described by Chris Hayes as President Donald Trump's 'bribery palace') the Secret Service found a USB drive in her possession. So they stuck it in a computer to see what was on it.
From the Miami Herald:
Secret Service agent Samuel Ivanovich, who interviewed Zhang on the day of her arrest, testified at the hearing. He stated that when another agent put Zhang’s thumb-drive into his computer, it immediately began to install files, a “very out-of-the-ordinary” event that he had never seen happen before during this kind of analysis. The agent had to immediately stop the analysis to halt any further corruption of his computer, Ivanovich said. The analysis is ongoing but still inconclusive, he testified.
Experts say don't do that.
Jake Williams, founder of Rendition Infosec and former NSA hacker, criticized the agent’s actions “threatened his own computing system and possibly the rest of the Secret Service network.'...
Williams said the best way to forensically examine a suspect USB drive is by plugging the device into an isolated Linux-based computer that doesn’t automatically mount the drive to the operating system.
“We would then create a forensic image of the USB and extract any malware for analysis in the lab,” he said. “While there is still a very small risk that the malware targets Linux, that’s not the normal case.”
https://boingboing.net/2019/04/09/secret-service-learns-why-you.html
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Mar, Thu 28 - 11:30 CET