Close Menu
USA Biz News Stay Current on Economy News
  • Home
  • USA
  • World
  • Politics
  • Business
    • CEO
    • Realtor
    • Entrepreneur
    • Journalist
  • Sports
    • Athlete
    • Coach
    • Fitness trainer
  • Health
    • Doctor
    • Plastic Surgeon
    • Beauty Cosmetics
  • Economy
  • Life Style
Trending
  • 8 exercises to ease dental neck and back pain I CDOCS Blog
  • 6 ways revenue cycle automation accelerates healthcare reimbursements
  • Best Devices – The Dermatology Review
  • Experience the Wonders of Forma Skin Tightening this Summer in Cary, North Carolina
  • Breathing is the key to sculpting your abs, says personal trainer
  • Taylor to stay on as Swansea City Women head coach
  • Daryll Neita: “I have my eyes set on that podium in Tokyo”
  • Jack Grealish future: Forward hits back at critics on social media as Man City future hangs in the balance | Football News
USA Biz News Stay Current on Economy News
Sunday, June 8
  • Home
  • USA
  • World
  • Politics
  • Business
    • CEO
    • Realtor
    • Entrepreneur
    • Journalist
  • Sports
    • Athlete
    • Coach
    • Fitness trainer
  • Health
    • Doctor
    • Plastic Surgeon
    • Beauty Cosmetics
  • Economy
  • Life Style
USA Biz News Stay Current on Economy News
Home » News » Hackers using malware to steal data from USB flash drives

Hackers using malware to steal data from USB flash drives

Jessica BrownBy Jessica Brown World
Share
Facebook Twitter LinkedIn Pinterest Email

Cybercriminals find constantly new ways of stealing their data. As people become more aware of common threats such as Phishing links, false websites, fraudulent electronic emails and immonation scams, attackers are becoming more creative in their approach.

One of the newest methods they are using involves addressing USB Flash units. It may seem surprising that they focus on something as simple as a flash unit, but the data it possesses can be valuable.

In addition, flash units can be used to spread malware to other devices.

Stay protected and informed! Get security alerts and expert technology advice: register in the Kurt Cyberguy report now

Flash 1 unit hacker

A person who connects a USB Flash unit to a laptop (Kurt “Cyberguy” Knutsson)

Why the objective of USB Flash units?

USB units are omnipresent in workplaces, especially in environments with air collected or restricted access systems, such as government and energy sectors. This makes them an easy objective for data theft and propagation of malware. Often, the thesis promotes sensitive files that are not available in network systems.

What is artificial intelligence (AI)?

When infected, USB units can spread malware Not only within a single organization but also in multiple entities if they are shared. These attacks do not depend on the vulnerabilities of the network, which allows them to avoid traditional security tools.

Flash Drive 2 hacker 2

USB flash unit connected to a laptop (Kurt “Cyberguy” Knutsson)

200 million social media records filtered in data violation x Major X

How computer pirates are pointing to their USB units

As reported by Kaspersky SecurelistA cybersecurity research platform, computer pirates are using USB units to disseminate malware so that it can easily avoid traditional security systems. A group, known as Goffee, starts its specific phishing emails. These emails for infected RAR files or office documents with harmful macros. Once open, programs such as PowerModul and Powertaskel are installed in the victim’s system.

These tools not only feel. They take the foundations for more attacks. PowerModul, in particular, plays an important role. It is a Powershell script introduced in 2024 that speaks with a command and control server (C2). From there, you can download and execute other tools, including two dangerous specials, Flashfilegrabber and USB Worm.

Flashfilegrabber is made to steal data from USB units. You can save stolen files locally or send them again to the hacker server. Then, the USB worm, which infects any USB unit found with PowerModul, turning that unit into a tool to spread malware to other systems.

What makes this method effective is that USB units are often shared between people and offices. This physical movement allows malware to extend even without internet connection. Malware hides original files in the USB and replaces them with malicious scripts disguised as normal -looking shortcuts. When some click on one of the thesis, without knowing it, they trigger the infection.

Get the Fox business on the fly by clicking here

Flash 3 unit hacker

Illustration of a hacker at work (Kurt “Cyberguy” Knutsson)

Malware exposes 3.9 billion passwords in a great threat of cybersecurity

4 practical ways of staying safe from the attacks led by USB

1. Do not connect unknown USB units: It may sound obvious, but this is one of the most common ways in which malware spreads. If you find a USB unit out there or someone gives you one who did not expect, avoid connecting it to your system. The attackers trust human curiosity to put malware on their machine.

2. Be more cautious with email attachments: Goffee campaigns or start with phishing emails that carry malicious rare files or office documents with macros. Always verify the address of the sender twice and never open unexpected attachments, especially if they ask you to “enable macros” or come from unknown contacts. In case of doubt, confirm through a different channel.

3. Avoid clicking suspicious links and use strong antivirus software: Many attacks such as Goffee start with emails that seem legitimate but contain malicious links. These links can take it to false login pages or discharge malware that sets the USB orientation tools scenario such as Power Modul.

The best way to safeguard the malicious links that install malware, which potentially access their private information, is to have strong antivirus software installed on all its devices. This protection can also alert it to the PHISHING Electronic Correos and Ransomware scams, maintaining their personal information and their safe digital assets. Get my elections for the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.

4. Scan USB units before using: The USB worm infects the USB units hiding original files and planting malicious scripts disguised as shortcuts, which trigger powermodul when clicking. Flashfilegrabber also stealing silently USBs files or going unnoticed. Always scan USB units with updated antivirus software before opening any file. Use a good reputation safety tool to verify hidden scripts, unusual or unexpected executable shortcuts. If the files appear renowned or hidden, do not click on them until it is verified safely.

Data elimination does what VPNs don’t do it: here is why they need both

Kurt key takeway

Cybercriminals prosper where convenience meets supervision. However, it is worth considering why USB is still such a soft objective. They are not only storage, but a cultural artifact of workplaces, especially in high -risk sectors such as energy or government, where off -line transfer feels safer than the cloud. But that trust is a blind spot. Attackers such as Goffee do not need zero days because human habits can exploit, such as sharing units, omiting scans and clicking without thinking.

How often does a USB unit plug without scanning it first? Get us knowing in Cyberguy.com/contact

Click here to get the Fox News application

To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter

Ask Kurt a question or let us know what stories we would like to cover

Follow Kurt in his social channels

Answers to Cyberguys most facts:

New Kurt:

Copyright 2025 Cyberguy.com. All rights reserved.

Kurt “Cyberguy” Knutsson is an award -winning technological journalist who has a deep love for technology, team and devices that improve life with their contributions for Fox News & Fox Business that begins in “Fox & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of ​​the story or comment on Cyberguy.com.

Previous ArticleCochin Shipyard readies to build big
Next Article Protest against Parandur airport reaches 1000th day

Keep Reading

Queen’s Piper Plays Bagpipes At Funeral

Russia’s Committed War Crimes In Ukraine: UN Report

The Best Things To Do In London This Weekend (17-19 Mar)

ICC Issues Vladimir Putin Arrest Warrant Over Ukraine

Iranian Girls Detained For Doing A TikTok Dance In Public

Wall Street Journal Reporter Evan Gershkovich Detained In Russia

Most View

Queen’s Piper Plays Bagpipes At Funeral

June 6, 2025

Russia’s Committed War Crimes In Ukraine: UN Report

June 4, 2025

The Best Things To Do In London This Weekend (17-19 Mar)

June 3, 2025
Latest Posts

Queen’s Piper Plays Bagpipes At Funeral

June 6, 2025

Russia’s Committed War Crimes In Ukraine: UN Report

June 4, 2025

The Best Things To Do In London This Weekend (17-19 Mar)

June 3, 2025

ICC Issues Vladimir Putin Arrest Warrant Over Ukraine

May 31, 2025

USA

  • World
  • Politics
  • Economy
  • Life Style

Business

  • CEO
  • Realtor
  • Entrepreneur
  • journalist

Sports

  • Athlete
  • Coach
  • Fitness Trainer

Health

  • Doctor
  • Plastic Surgeon
  • Beauty Cosmetics
© 2017-2025 usabiznews. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.