Close Menu
Ztoog
    What's Hot
    Technology

    Modern workplace tech linked to lower employee well-being, study finds

    AI

    AI model deciphers the code in proteins that tells them where to go | Ztoog

    The Future

    Best Xbox Game Pass Deals: Save Big Money on Subscriptions of All Lengths

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      Any wall can be turned into a camera to see around corners

      JD Vance and President Trump’s Sons Hype Bitcoin at Las Vegas Conference

      AI may already be shrinking entry-level jobs in tech, new research suggests

      Today’s NYT Strands Hints, Answer and Help for May 26 #449

      LiberNovo Omni: The World’s First Dynamic Ergonomic Chair

    • Technology

      A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users (Reed Albergotti/Semafor)

      Gemini in Google Drive can now help you skip watching that painfully long Zoom meeting

      Apple iPhone exports from China to the US fall 76% as India output surges

      Today’s NYT Wordle Hints, Answer and Help for May 26, #1437

      5 Skills Kids (and Adults) Need in an AI World – O’Reilly

    • Gadgets

      Future-proof your career by mastering AI skills for just $20

      8 Best Vegan Meal Delivery Services and Kits (2025), Tested and Reviewed

      Google Home is getting deeper Gemini integration and a new widget

      Google Announces AI Ultra Subscription Plan With Premium Features

      Google shows off Android XR-based glasses, announces Warby Parker team-up

    • Mobile

      Microsoft is done being subtle – this new tool screams “upgrade now”

      Wallpaper Wednesday: Android wallpapers 2025-05-28

      Google can make smart glasses accessible with Warby Parker, Gentle Monster deals

      vivo T4 Ultra specs leak

      Forget screens: more details emerge on the mysterious Jony Ive + OpenAI device

    • Science

      Analysts Say Trump Trade Wars Would Harm the Entire US Energy Sector, From Oil to Solar

      Do we have free will? Quantum experiments may soon reveal the answer

      Was Planet Nine exiled from the solar system as a baby?

      How farmers can help rescue water-loving birds

      A trip to the farm where loofahs grow on vines

    • AI

      Rationale engineering generates a compact new tool for gene therapy | Ztoog

      The AI Hype Index: College students are hooked on ChatGPT

      Learning how to predict rare kinds of failures | Ztoog

      Anthropic’s new hybrid AI model can work on tasks autonomously for hours at a time

      AI learns how vision and sound are connected, without human intervention | Ztoog

    • Crypto

      GameStop bought $500 million of bitcoin

      CoinW Teams Up with Superteam Europe to Conclude Solana Hackathon and Accelerate Web3 Innovation in Europe

      Ethereum Net Flows Turn Negative As Bulls Push For $3,500

      Bitcoin’s Power Compared To Nuclear Reactor By Brazilian Business Leader

      Senate advances GENIUS Act after cloture vote passes

    Ztoog
    Home » USB worm unleashed by Russian state hackers spreads worldwide
    Technology

    USB worm unleashed by Russian state hackers spreads worldwide

    Facebook Twitter Pinterest WhatsApp
    USB worm unleashed by Russian state hackers spreads worldwide
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Getty Images

    A bunch of Russian-state hackers identified for nearly completely concentrating on Ukranian entities has branched out in current months both by chance or purposely by permitting USB-based espionage malware to contaminate a wide range of organizations in different international locations.

    The group—identified by many names, together with Gamaredon, Primitive Bear, ACTINIUM, Armageddon, and Shuckworm—has been lively since no less than 2014 and has been attributed to Russia’s Federal Security Service by the Security Service of Ukraine. Most Kremlin-backed teams take pains to fly beneath the radar; Gamaredon does not care to. Its espionage-motivated campaigns concentrating on massive numbers of Ukrainian organizations are straightforward to detect and tie again to the Russian authorities. The campaigns sometimes revolve round malware that goals to acquire as a lot data from targets as potential.

    One of these instruments is a pc worm designed to unfold from pc to pc by means of USB drives. Tracked by researchers from Check Point Research as LitterDrifter, the malware is written within the Visual Basic Scripting language. LitterDrifter serves two functions: to promiscuously unfold from USB drive to USB drive and to completely infect the units that connect with such drives with malware that completely communicates with Gamaredon-operated command and management servers.

    “Gamaredon continues to focus on [a] wide variety [of] Ukrainian targets, but due to the nature of the USB worm, we see indications of possible infection in various countries like USA, Vietnam, Chile, Poland and Germany,” Check Point researchers reported lately. “In addition, we’ve observed evidence of infections in Hong Kong. All this might indicate that much like other USB worms, LitterDrifter [has] spread beyond its intended targets.”

    Advertisement

    Virus Total Submissions of LitterDrifter
    Enlarge / Virus Total Submissions of LitterDrifter

    Check Point Research

    The picture above, monitoring submissions of LitterDrifter to the Alphabet-owned VirusTotal service, signifies that the Gamaredon malware could also be infecting targets nicely outdoors the borders of Ukraine. VirusTotal submissions often come from folks or organizations that encounter unfamiliar or suspicious-looking software program on their networks and need to know if it’s malicious. The knowledge means that the variety of infections within the US, Vietnam, Chile, Poland, and Germany mixed could also be roughly half of these hitting organizations inside Ukraine.

    The execution flow of LitterDrifter.
    Enlarge / The execution movement of LitterDrifter.

    Check Point Research

    Worms are types of malware that unfold with out requiring a consumer to take any motion. As self-propagating software program, worms are infamous for explosive development at exponential scales. Stuxnet, the worm created by the US National Security Agency and its counterpart from Israel, has been a cautionary story for spy businesses. Its creators supposed Stuxnet to contaminate solely a comparatively small variety of Iranian targets collaborating in that nation’s uranium enrichment program. Instead, Stuxnet unfold far and large, infecting an estimated 100,000 computer systems worldwide. Non-USB-activated worms equivalent to NotPetya and WannaCry have contaminated much more.

    LitterDrifter gives an identical means for spreading far and large. Check Point researchers defined:

    The core essence of the Spreader module lies in recursively accessing subfolders in every drive and creating LNK decoy shortcuts, alongside a hidden copy of the “trash.dll” file.

    trash.dll is distributed as a hidden file in a USB drive together with a decoy LNK.
    Enlarge / trash.dll is distributed as a hidden file in a USB drive along with a decoy LNK.

    Upon execution, the module queries the pc’s logical drives utilizing Windows Management Instrumentation (WMI), and searches for logical disks with the MediaType worth set to null, a way usually used to establish detachable USB drives.

    LitterDrifter’s spreader component.
    Enlarge / LitterDrifter’s spreader part.

    Check Point Research

    For every logical drive detected, the spreader invokes the createShortcutsInSubfolders perform. Within this perform, it iterates the subfolders of a offered folder as much as a depth of two.

    For each subfolder, it employs the CreateShortcut perform as a part of the “Create LNK” motion, which is accountable for producing a shortcut with particular attributes. These shortcuts are LNK information which might be given random names chosen from an array within the code. This is an instance of the lure’s names from an array in one of many samples that we investigated:("Bank_accоunt", "постановa", "Bank_accоunt", "службовa", "cоmpromising_evidence"). The LNK information use wscript.exe **** to execute “trash.dll” with specified arguments " ""trash.dll"" /webm //e:vbScript //b /wm /cal ". In addition to producing the shortcut, the perform additionally creates a hidden copy of “trash.dll” within the subfolder.

     The function in the Spreader component used to iterate subfolders.
    Enlarge / The perform within the Spreader part used to iterate subfolders.

    Check Point Research

    The methods described are comparatively easy, however as evidenced, they’re loads efficient. So a lot in order that they’ve allowed it to interrupt out of its earlier Ukrainian-only concentrating on area to a a lot larger realm. People who need to know in the event that they’ve been contaminated can test the Check Point submit’s indicators of compromise part, which lists file hashes, IP addresses, and domains used by the malware.

    Advertisement

    “Comprised of two primary components—-a spreading module and a C2 module—it’s clear that LitterDrifter was designed to support a large-scale collection operation,” Check Point researchers wrote. “It leverages simple, yet effective techniques to ensure it can reach the widest possible set of targets in the region.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Technology

    A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users (Reed Albergotti/Semafor)

    Technology

    Gemini in Google Drive can now help you skip watching that painfully long Zoom meeting

    Technology

    Apple iPhone exports from China to the US fall 76% as India output surges

    Technology

    Today’s NYT Wordle Hints, Answer and Help for May 26, #1437

    Technology

    5 Skills Kids (and Adults) Need in an AI World – O’Reilly

    Technology

    How To Come Back After A Layoff

    Technology

    Are Democrats fumbling a golden opportunity?

    Technology

    Crypto elite increasingly worried about their personal safety

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    AI

    Researchers from Kyung Hee University and Nota Unveil MobileSAMv2: A Breakthrough in Efficient and Rapid Image Segmentation

    Vision foundational or basic fashions are used in laptop imaginative and prescient duties. These fashions…

    Mobile

    Galaxy Watches to gain an important health feature with the One UI 5 Watch update

    What you want to knowSamsung declares its irregular coronary heart rhythm notification for the Galaxy…

    Gadgets

    Apple Quietly Launches M3 MacBook Air With A Major Focus On AI

    Without any fuss, Apple simply launched the M3 MacBook Air, suggesting a pivotal position for…

    Crypto

    Did Ethereum Bribe The SEC To Go After XRP?

    Cardano founder Charles Hoskinson just lately gave his ideas on whether or not the US…

    Crypto

    Move Over Spot Bitcoin ETFs: ProShares Files For 5 Inverse And Leveraged ETFs

    Asset supervisor ProShares is seeking to acquire a bonus out there, as steered by its…

    Our Picks
    Science

    NASA spacecraft Lucy says hello to asteroid Dinkinesh in flyby

    Technology

    Singapore’s Locofy launches its one-click design-to-code tool

    The Future

    Best 4K Drones of 2023

    Categories
    • AI (1,493)
    • Crypto (1,753)
    • Gadgets (1,805)
    • Mobile (1,850)
    • Science (1,866)
    • Technology (1,802)
    • The Future (1,648)
    Most Popular
    AI

    These documents are influencing the DOGE-sphere’s agenda

    Gadgets

    An All Rounder Under Rs. 20,000?

    Mobile

    T-Mobile CEO Sievert says he might consider the purchase of this wireless carrier

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.