<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: USB worm unleashed by Russian state hackers spreads worldwide in Threats</title>
    <link>https://community.isc2.org/t5/Threats/USB-worm-unleashed-by-Russian-state-hackers-spreads-worldwide/m-p/64844#M981</link>
    <description>&lt;P&gt;I find a lot of the reporting of malware falls into the fear-mongering category as it typically fails to describe the&amp;nbsp; platform involved and vector of attack. The description points to Windows malware (Visual Basic script and Windows Management Instrumentation) and the vector doesn't really seem to qualify as a worm as it seems like some user interaction is involved, even beyond plugging in the USB drive - seems lie the malware is accessed through shortcut (i.e. .lnk) file so that would seem to say a user must click it/run it somehow?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe I am missing something, but it seems like it is just another flavor of VB malware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Nov 2023 00:20:48 GMT</pubDate>
    <dc:creator>JoePete</dc:creator>
    <dc:date>2023-11-24T00:20:48Z</dc:date>
    <item>
      <title>USB worm unleashed by Russian state hackers spreads worldwide</title>
      <link>https://community.isc2.org/t5/Threats/USB-worm-unleashed-by-Russian-state-hackers-spreads-worldwide/m-p/64810#M980</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It appears the Russians have a successful attack vector via USB Keys "LittleDrifter", which appears to keep propagating widely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sounds like security education and awareness needs beefing up?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://arstechnica.com/security/2023/11/normally-targeting-ukraine-russian-state-hackers-spread-usb-worm-worldwide/" target="_blank"&gt;https://arstechnica.com/security/2023/11/normally-targeting-ukraine-russian-state-hackers-spread-usb-worm-worldwide/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 05:13:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/USB-worm-unleashed-by-Russian-state-hackers-spreads-worldwide/m-p/64810#M980</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-11-22T05:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: USB worm unleashed by Russian state hackers spreads worldwide</title>
      <link>https://community.isc2.org/t5/Threats/USB-worm-unleashed-by-Russian-state-hackers-spreads-worldwide/m-p/64844#M981</link>
      <description>&lt;P&gt;I find a lot of the reporting of malware falls into the fear-mongering category as it typically fails to describe the&amp;nbsp; platform involved and vector of attack. The description points to Windows malware (Visual Basic script and Windows Management Instrumentation) and the vector doesn't really seem to qualify as a worm as it seems like some user interaction is involved, even beyond plugging in the USB drive - seems lie the malware is accessed through shortcut (i.e. .lnk) file so that would seem to say a user must click it/run it somehow?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe I am missing something, but it seems like it is just another flavor of VB malware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 00:20:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/USB-worm-unleashed-by-Russian-state-hackers-spreads-worldwide/m-p/64844#M981</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2023-11-24T00:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: USB worm unleashed by Russian state hackers spreads worldwide</title>
      <link>https://community.isc2.org/t5/Threats/USB-worm-unleashed-by-Russian-state-hackers-spreads-worldwide/m-p/64846#M982</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;&amp;nbsp;&amp;nbsp; In the old days, I would agree with you, but a lot of these attacks are directed in this case specifically towards Ukraine via a state nation, and it then appears to have spread further than expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We appear to in an era of secondary outcomes, or targets, the main target being the intended victim or country, but with unintended consequences, as it is allowed to carry on after it has been released.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 03:36:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/USB-worm-unleashed-by-Russian-state-hackers-spreads-worldwide/m-p/64846#M982</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-11-24T03:36:33Z</dc:date>
    </item>
  </channel>
</rss>

