When a USB Flash Drive is Actually a Bomb



USB Based Ransomware AttackA journalist based in Ecuador recently used a USB flash drive that was actually a legitimate bomb.

While the journalist thankfully suffered only minor injuries, there have been other journalists at multiple news outlets that were sent the same USB flash drive in an envelope with the same explosive. In a statement by Xavier Chango, the National Head of Forensic Science, “It’s a military-type explosive, but very small capsules".

Per the Ecuadorian government, these attacks were fueled by attempts to intimidate the media. In a statement, “Any attempt to intimidate journalism and freedom of expression is a loathsome action that should be punished with all the rigor of justice". 

Although this is a very extreme case, the main lesson is to NEVER insert an unknown USB drive you are not familiar with. New-school security awareness training can train your employees to watch out for these types of USB attacks. 

The Guardian has the full story


Free USB Security Test

On average 45% of your users will plug in USBs. Find out now what your user’s reactions are to unknown USBs, with KnowBe4's new Free USB Security Test. Download our special, "beaconized" file onto any USB drive. Then label the drive with something enticing and drop the drive at an on-site high traffic area. If an employee picks it up, plugs it in their workstation and opens the file, it will "call home" and report the "fail" to your KnowBe4 console. And for Office documents, if the user also enables macros (!), additional data is tracked and geomapped.

USBHow your free 7-day USB Security Test works:

  • Fill out the form, and immediately...
  • Download "beaconized" Word, Excel or PDF files
  • Copy to any USB Drive, label and drop it
  • Reports on opens and if macros were enabled
  • Takes just a few minutes to set up

Test Your Users

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/usb-security-test



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews