{"id":1707,"date":"2016-10-03T17:12:22","date_gmt":"2016-10-03T17:12:22","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1707"},"modified":"2021-07-22T03:49:59","modified_gmt":"2021-07-22T07:49:59","slug":"lost-found-dangers-mystery-usb-drives","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1707","title":{"rendered":"Network Security Best Practices: What To Do With A Mysterious Thumbdrive"},"content":{"rendered":"<p>So if you found a USB Stick in the parking lot this morning, what would you do?\u00a0 What if you found one in the course of your job, in a rental car, or in a \u201cLost &amp; Found\u201d box in your office?\u00a0 You would be curious to see what is on the drive or inclined to try and locate who it belongs to.\u00a0 What would you consider the chances are you\u2019d plug it into your work or personal computer? A study conducted by Google, the University of Illinois, and University of Michigan show these small USB drives \/ USB Thumb Drives \/ USB Sticks are lost all the time, in all sorts of places, from taxies, to dry cleaners and parking lots.\u00a0 Generally, the data isn\u2019t encrypted, and the only way to find out who it belongs to is to plug it in to see if there are any clues.\u00a0 Malware developers, cyber-criminals, and governments have been known to utilize this delivery method in the past.\u00a0 In the study, 297 USB drives were dropped around a college campus, placed in strategic locations for people to pick up.\u00a0 It was proven to be highly effective in infecting devices, with the first incident occurring in less than six minutes after being left behind. Perhaps some could argue that the study was skewed with the social experiment being conducted on a college campus.\u00a0 However, a real-world example would be the \u201c<a href=\"http:\/\/www.forbes.com\/2010\/10\/06\/iran-nuclear-computer-technology-security-stuxnet-worm.html\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a>\u201d case where a USB Drive was found in the Bushehr nuclear plant parking lot and unwittingly plugged in to the facility\u2019s network. The drive contained a worm specifically designed to infiltrate the target. It remained undetected until much later, when it spread well beyond the intended confines, reaching over 45K computers worldwide. Results of the study also concluded nearly half the people who picked up a found USB drive plugged it into a computer connected to the internet.\u00a0 While most were acting in good faith, the conclusions clearly demonstrated an effective way to spread malware by dropping a USB drive in the proximity of the intended target organization. So by now you are asking yourself, what can you do if you find a USB drive and want to locate the owner without putting yourself at risk?\u00a0\u00a0 Unfortunately, the only real way to see the contents of a USB drive is to put it into a machine that will not allow writing of any files to a hard drive.\u00a0 For example, you could boot a PC without a hard drive from a Linux distro bootable DVD \/ CD \/ USB.\u00a0 This would allow you to mount the \u201cfound\u201d USB drive and view files.\u00a0\u00a0 While one of the safest methods, it is generally beyond the average person\u2019s technical capabilities; it\u2019s why the best thing you should do is turn it in to a lost and found. Be sure to warn whoever you turn it in to, to not plug it into any computers without having a trained IT professional who is capable of properly reviewing the content. It is second nature to want to be helpful, but it is important to remember that malware creators and criminals are always seeking ways to exploit such vulnerabilities, particularly while trying to gain access to highly secure networks.\u00a0 So be safe and don\u2019t risk infecting your computer by plugging in a device that doesn\u2019t belong to you. <div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So if you found a USB Stick in the parking lot this morning, what would you do?\u00a0 What if you found one in the course of your job, in a rental car, or in a \u201cLost &amp; Found\u201d box in your office?\u00a0 You would be curious to see what is on the drive or inclined&hellip;<\/p>\n","protected":false},"author":5,"featured_media":8474,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[283,284,242,270,129,21,133,285,286,287],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What to do With a Mysterious Thumbdrive | Dangers of Mystery USBs | TSI<\/title>\n<meta name=\"description\" content=\"Learn what to do when you find a mysterious thumbdrive. Read these network security best practices that can keep your organization safe.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do With a Mysterious Thumbdrive | Dangers of Mystery USBs | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn what to do when you find a mysterious thumbdrive. Read these network security best practices that can keep your organization safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1707\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-03T17:12:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-22T07:49:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kenneth Sprague\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kenneth Sprague\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1707\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1707\",\"name\":\"What to do With a Mysterious Thumbdrive | Dangers of Mystery USBs | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1707#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1707#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png\",\"datePublished\":\"2016-10-03T17:12:22+00:00\",\"dateModified\":\"2021-07-22T07:49:59+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/8520f0c99514f166c10ad62fb4e2f22b\"},\"description\":\"Learn what to do when you find a mysterious thumbdrive. Read these network security best practices that can keep your organization safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1707#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1707\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1707#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1707#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security Best Practices: What To Do With A Mysterious Thumbdrive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/8520f0c99514f166c10ad62fb4e2f22b\",\"name\":\"Kenneth Sprague\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a917c8ce0e2a577ce7c1e1cdd58f0b6b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a917c8ce0e2a577ce7c1e1cdd58f0b6b?s=96&d=mm&r=g\",\"caption\":\"Kenneth Sprague\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=5\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do With a Mysterious Thumbdrive | Dangers of Mystery USBs | TSI","description":"Learn what to do when you find a mysterious thumbdrive. Read these network security best practices that can keep your organization safe.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What to do With a Mysterious Thumbdrive | Dangers of Mystery USBs | TSI","og_description":"Learn what to do when you find a mysterious thumbdrive. Read these network security best practices that can keep your organization safe.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1707","og_site_name":"TSI Support","article_published_time":"2016-10-03T17:12:22+00:00","article_modified_time":"2021-07-22T07:49:59+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png","type":"image\/png"}],"author":"Kenneth Sprague","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kenneth Sprague","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1707","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1707","name":"What to do With a Mysterious Thumbdrive | Dangers of Mystery USBs | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1707#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1707#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png","datePublished":"2016-10-03T17:12:22+00:00","dateModified":"2021-07-22T07:49:59+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/8520f0c99514f166c10ad62fb4e2f22b"},"description":"Learn what to do when you find a mysterious thumbdrive. Read these network security best practices that can keep your organization safe.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1707#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1707"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1707#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/10\/USB-Drive-Header-Image.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1707#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Network Security Best Practices: What To Do With A Mysterious Thumbdrive"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/8520f0c99514f166c10ad62fb4e2f22b","name":"Kenneth Sprague","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a917c8ce0e2a577ce7c1e1cdd58f0b6b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a917c8ce0e2a577ce7c1e1cdd58f0b6b?s=96&d=mm&r=g","caption":"Kenneth Sprague"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=5"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1707"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1707"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1707\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8474"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}