Businesses have been warned to remain wary of stray USB keys after an experiment conducted by security firm Sophos found that a majority of random keys left on public transported contained malicious software.
The experiment comes just 18 months after computer giant IBM suffered an embarrassing failure last year when a small number of USB keys handed out at its Australian conference were confirmed to have contained a piece of malware.
In Sophosโ new experiment, the company obtained 50 USB keys that were left in the lost and found section of Sydneyโs CityRail system. It then examined each one โ 66% were found to have contained at least one piece of malware.
Sophos head of technology in Asia-Pacific, Paul Ducklin, says he was surprised the number of infected keys was so high.
โItโs not dramatic, itโs not the end of the world, but I was surprised. I thought itโd probably be about 25%, but when it was two-thirds, I thought, this doesnโt reflect very well on our collective attitude to malware.โ
The other surprising find was that none of the keys appeared to have any sort of encryption.
โEven when there were files on these keys that could have given away limited information, there was no encryption. I would have been able to find out some information about what was going on here.โ
โAt some point, the owners of these keys that are sharing a whole photo album or other information, they should have thought that all of this information could have revealed some private details.โ
At least one of the keys contained a copy of the Conficker virus โ a major virus that brought down thousands of computers in the past few years, including those in Government departments worldwide.
And while Ducklin says the experiment isnโt a major one โ and he admits the sample size is small โ he nevertheless says itโs a reminder for businesses they need to lock down their networks from foreign USB keys that donโt have any sort of encryption.
โThe primary way malware gets into organisations is by spreading through networks. It can spread via the internet, but the main way it occurs is through USB keys.
โUSB keys are doing a lot of dirty work and thatโs why businesses need to watch out for them.โ
Ducklin also says any individuals using a USB key need to apply some sort of encryption, even if theyโre using a Mac.
โThere may be some people who think they donโt need encryption or virus software because theyโre using a Mac. But the keys we found that appeared to have come from Mac users โ at least some of them were infected.โ
โNone appeared to be using encryption. Somehow, I think if the people who owned these keys knew they were being analysed, they would change their minds.โ
Comments