{"id":2969,"date":"2018-01-19T15:10:15","date_gmt":"2018-01-19T15:10:15","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2969"},"modified":"2021-07-19T00:40:42","modified_gmt":"2021-07-19T04:40:42","slug":"infected-usb-drives-handed-data-security-event","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2969","title":{"rendered":"Cyber Crime Cases: Infected USB Drives Distributed at Data Security Event"},"content":{"rendered":"<p>During a recent data security expo hosted by Taiwan\u2019s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the <a class=\"zem_slink\" title=\"Criminal Investigation Bureau\" href=\"http:\/\/en.wikipedia.org\/wiki\/Criminal_Investigation_Bureau\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Criminal Investigation Bureau<\/a>. These infected <a class=\"zem_slink\" title=\"USB flash drive\" href=\"http:\/\/en.wikipedia.org\/wiki\/USB_flash_drive\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">USB sticks<\/a> were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.<\/p>\n<p><span style=\"color: #800000;\"><strong>How Did This Happen?<\/strong><\/span><\/p>\n<p>The malware program installed on the thumb drives have the file name XtbSeDuA.exe.\u00a0 It was designed to collect personal data and transmit it to a Poland-based <a class=\"zem_slink\" title=\"IP address\" href=\"http:\/\/en.wikipedia.org\/wiki\/IP_address\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">IP address<\/a> that then bounces the information to servers linked to an electronic fraud ring uncovered by Europol in 2015. Fortunately, only older 32-bit computers are susceptible to the malware and most anti-virus software can successfully detect and quarantine it.<\/p>\n<p>The 8-gig thumb drives were originally purchased from contractors, some manufactured in China, but espionage has been ruled out by the bureau after determining that it originated from an infected workstation at\u00a0New Taipei City-based company,\u00a0 Shawo Hwa Industries. An employee at the company used the infected computer to transfer an operating system to the drives for testing storage capacity, allowing the malware to be transmitted to 54 units.<\/p>\n<p>Random sampling of the thumb drives, which were sourced from various contractors, failed to discover the malware.\u00a0 Distribution has halted in the afternoon of December 12<sup>th<\/sup> after members of the public complained that drives had been flagged by their anti-virus programs, adding that 20 drives have been recovered while 34 remain in the wild. The server receiving the data from the malware has also been shut down after the bureau took measures to address the issue.<\/p>\n<p><span style=\"color: #800000;\"><strong>Our Recommendations<\/strong><\/span><\/p>\n<p>The <a href=\"https:\/\/tsisupport.com\/tsistaging\/lost-found-dangers-mystery-usb-drives\/\">dangers of USB drives<\/a> are a growing concern, especially when handed out from what are seemingly trusted parties.\u00a0 Regrettably, there are only a <a href=\"https:\/\/tsisupport.com\/tsistaging\/lost-found-dangers-mystery-usb-drives\/\">few ways to safely see the contents<\/a> of a USB drive without plugging it in. For larger organizations, managing the actions of every user connected to your network can be next to impossible.\u00a0 That\u2019s why partnering with a trusted managed service provider makes sense.\u00a0 We can help mitigate risk and implement network security plans to minimize these affects of an attack. To learn more, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today.<\/p>\n<p><span style=\"color: #800000;\"><strong>Source: <\/strong><\/span><a href=\"http:\/\/www.taipeitimes.com\/News\/taiwan\/archives\/2018\/01\/08\/2003685393\" target=\"_blank\" rel=\"noopener noreferrer\">Infected USB Sticks Handed Out at Data Security Event<\/a><\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>During a recent data security expo hosted by Taiwan\u2019s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.<\/p>\n","protected":false},"author":2,"featured_media":8617,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[129,363],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Infected USB Drives Distributed at Event | Cyber Crime Cases | TSI<\/title>\n<meta name=\"description\" content=\"Read the latest in cybersecurity current events and cyber crime cases. Learn how a data event distributed infected USB drives to attendees.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infected USB Drives Distributed at Event | Cyber Crime Cases | TSI\" \/>\n<meta property=\"og:description\" content=\"Read the latest in cybersecurity current events and cyber crime cases. Learn how a data event distributed infected USB drives to attendees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2969\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-19T15:10:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-19T04:40:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2969\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2969\",\"name\":\"Infected USB Drives Distributed at Event | Cyber Crime Cases | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2969#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2969#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png\",\"datePublished\":\"2018-01-19T15:10:15+00:00\",\"dateModified\":\"2021-07-19T04:40:42+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Read the latest in cybersecurity current events and cyber crime cases. Learn how a data event distributed infected USB drives to attendees.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2969#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2969\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2969#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png\",\"width\":1024,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2969#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Crime Cases: Infected USB Drives Distributed at Data Security Event\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infected USB Drives Distributed at Event | Cyber Crime Cases | TSI","description":"Read the latest in cybersecurity current events and cyber crime cases. Learn how a data event distributed infected USB drives to attendees.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Infected USB Drives Distributed at Event | Cyber Crime Cases | TSI","og_description":"Read the latest in cybersecurity current events and cyber crime cases. Learn how a data event distributed infected USB drives to attendees.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2969","og_site_name":"TSI Support","article_published_time":"2018-01-19T15:10:15+00:00","article_modified_time":"2021-07-19T04:40:42+00:00","og_image":[{"width":1024,"height":341,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2969","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2969","name":"Infected USB Drives Distributed at Event | Cyber Crime Cases | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2969#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2969#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png","datePublished":"2018-01-19T15:10:15+00:00","dateModified":"2021-07-19T04:40:42+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Read the latest in cybersecurity current events and cyber crime cases. Learn how a data event distributed infected USB drives to attendees.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2969#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2969"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2969#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/USB-Drives-Header-1140x380-1.png","width":1024,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2969#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Cyber Crime Cases: Infected USB Drives Distributed at Data Security Event"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2969"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2969"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2969\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8617"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}