Close Menu
Ztoog
    What's Hot
    Science

    These are the exciting space missions slated for launch in 2024

    Technology

    Best Chest Strap Heart-Rate Monitors for 2023

    Technology

    The Legend of Zelda is getting a live-action film from Nintendo and Sony

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      How I Turn Unstructured PDFs into Revenue-Ready Spreadsheets

      Is it the best tool for 2025?

      The clocks that helped define time from London’s Royal Observatory

      Summer Movies Are Here, and So Are the New Popcorn Buckets

      India-Pak conflict: Pak appoints ISI chief, appointment comes in backdrop of the Pahalgam attack

    • Technology

      Ensure Hard Work Is Recognized With These 3 Steps

      Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

      Is Duolingo the face of an AI jobs crisis?

      The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

      The more Google kills Fitbit, the more I want a Fitbit Sense 3

    • Gadgets

      Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

      Apple plans to split iPhone 18 launch into two phases in 2026

      Upgrade your desk to Starfleet status with this $95 USB-C hub

      37 Best Graduation Gift Ideas (2025): For College Grads

      Backblaze responds to claims of “sham accounting,” customer backups at risk

    • Mobile

      Samsung Galaxy S25 Edge promo materials leak

      What are people doing with those free T-Mobile lines? Way more than you’d expect

      Samsung doesn’t want budget Galaxy phones to use exclusive AI features

      COROS’s charging adapter is a neat solution to the smartwatch charging cable problem

      Fortnite said to return to the US iOS App Store next week following court verdict

    • Science

      Failed Soviet probe will soon crash to Earth – and we don’t know where

      Trump administration cuts off all future federal funding to Harvard

      Does kissing spread gluten? New research offers a clue.

      Why Balcony Solar Panels Haven’t Taken Off in the US

      ‘Dark photon’ theory of light aims to tear up a century of physics

    • AI

      How to build a better AI benchmark

      Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

      This data set helps researchers spot harmful stereotypes in LLMs

      Making AI models more trustworthy for high-stakes settings | Ztoog

      The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    • Crypto

      ‘The Big Short’ Coming For Bitcoin? Why BTC Will Clear $110,000

      Bitcoin Holds Above $95K Despite Weak Blockchain Activity — Analytics Firm Explains Why

      eToro eyes US IPO launch as early as next week amid easing concerns over Trump’s tariffs

      Cardano ‘Looks Dope,’ Analyst Predicts Big Move Soon

      Speak at Ztoog Disrupt 2025: Applications now open

    Ztoog
    Home » USB worm unleashed by Russian state hackers spreads worldwide
    Technology

    USB worm unleashed by Russian state hackers spreads worldwide

    Facebook Twitter Pinterest WhatsApp
    USB worm unleashed by Russian state hackers spreads worldwide
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Getty Images

    A bunch of Russian-state hackers identified for nearly completely concentrating on Ukranian entities has branched out in current months both by chance or purposely by permitting USB-based espionage malware to contaminate a wide range of organizations in different international locations.

    The group—identified by many names, together with Gamaredon, Primitive Bear, ACTINIUM, Armageddon, and Shuckworm—has been lively since no less than 2014 and has been attributed to Russia’s Federal Security Service by the Security Service of Ukraine. Most Kremlin-backed teams take pains to fly beneath the radar; Gamaredon does not care to. Its espionage-motivated campaigns concentrating on massive numbers of Ukrainian organizations are straightforward to detect and tie again to the Russian authorities. The campaigns sometimes revolve round malware that goals to acquire as a lot data from targets as potential.

    One of these instruments is a pc worm designed to unfold from pc to pc by means of USB drives. Tracked by researchers from Check Point Research as LitterDrifter, the malware is written within the Visual Basic Scripting language. LitterDrifter serves two functions: to promiscuously unfold from USB drive to USB drive and to completely infect the units that connect with such drives with malware that completely communicates with Gamaredon-operated command and management servers.

    “Gamaredon continues to focus on [a] wide variety [of] Ukrainian targets, but due to the nature of the USB worm, we see indications of possible infection in various countries like USA, Vietnam, Chile, Poland and Germany,” Check Point researchers reported lately. “In addition, we’ve observed evidence of infections in Hong Kong. All this might indicate that much like other USB worms, LitterDrifter [has] spread beyond its intended targets.”

    Advertisement

    Virus Total Submissions of LitterDrifter
    Enlarge / Virus Total Submissions of LitterDrifter

    Check Point Research

    The picture above, monitoring submissions of LitterDrifter to the Alphabet-owned VirusTotal service, signifies that the Gamaredon malware could also be infecting targets nicely outdoors the borders of Ukraine. VirusTotal submissions often come from folks or organizations that encounter unfamiliar or suspicious-looking software program on their networks and need to know if it’s malicious. The knowledge means that the variety of infections within the US, Vietnam, Chile, Poland, and Germany mixed could also be roughly half of these hitting organizations inside Ukraine.

    The execution flow of LitterDrifter.
    Enlarge / The execution movement of LitterDrifter.

    Check Point Research

    Worms are types of malware that unfold with out requiring a consumer to take any motion. As self-propagating software program, worms are infamous for explosive development at exponential scales. Stuxnet, the worm created by the US National Security Agency and its counterpart from Israel, has been a cautionary story for spy businesses. Its creators supposed Stuxnet to contaminate solely a comparatively small variety of Iranian targets collaborating in that nation’s uranium enrichment program. Instead, Stuxnet unfold far and large, infecting an estimated 100,000 computer systems worldwide. Non-USB-activated worms equivalent to NotPetya and WannaCry have contaminated much more.

    LitterDrifter gives an identical means for spreading far and large. Check Point researchers defined:

    The core essence of the Spreader module lies in recursively accessing subfolders in every drive and creating LNK decoy shortcuts, alongside a hidden copy of the “trash.dll” file.

    trash.dll is distributed as a hidden file in a USB drive together with a decoy LNK.
    Enlarge / trash.dll is distributed as a hidden file in a USB drive along with a decoy LNK.

    Upon execution, the module queries the pc’s logical drives utilizing Windows Management Instrumentation (WMI), and searches for logical disks with the MediaType worth set to null, a way usually used to establish detachable USB drives.

    LitterDrifter’s spreader component.
    Enlarge / LitterDrifter’s spreader part.

    Check Point Research

    For every logical drive detected, the spreader invokes the createShortcutsInSubfolders perform. Within this perform, it iterates the subfolders of a offered folder as much as a depth of two.

    For each subfolder, it employs the CreateShortcut perform as a part of the “Create LNK” motion, which is accountable for producing a shortcut with particular attributes. These shortcuts are LNK information which might be given random names chosen from an array within the code. This is an instance of the lure’s names from an array in one of many samples that we investigated:("Bank_accоunt", "постановa", "Bank_accоunt", "службовa", "cоmpromising_evidence"). The LNK information use wscript.exe **** to execute “trash.dll” with specified arguments " ""trash.dll"" /webm //e:vbScript //b /wm /cal ". In addition to producing the shortcut, the perform additionally creates a hidden copy of “trash.dll” within the subfolder.

     The function in the Spreader component used to iterate subfolders.
    Enlarge / The perform within the Spreader part used to iterate subfolders.

    Check Point Research

    The methods described are comparatively easy, however as evidenced, they’re loads efficient. So a lot in order that they’ve allowed it to interrupt out of its earlier Ukrainian-only concentrating on area to a a lot larger realm. People who need to know in the event that they’ve been contaminated can test the Check Point submit’s indicators of compromise part, which lists file hashes, IP addresses, and domains used by the malware.

    Advertisement

    “Comprised of two primary components—-a spreading module and a C2 module—it’s clear that LitterDrifter was designed to support a large-scale collection operation,” Check Point researchers wrote. “It leverages simple, yet effective techniques to ensure it can reach the widest possible set of targets in the region.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Technology

    Ensure Hard Work Is Recognized With These 3 Steps

    Technology

    Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

    Technology

    Is Duolingo the face of an AI jobs crisis?

    Technology

    The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

    Technology

    The more Google kills Fitbit, the more I want a Fitbit Sense 3

    Technology

    Sorry Shoppers, Amazon Says Tariff Cost Feature ‘Is Not Going to Happen’

    Technology

    Vibe Coding, Vibe Checking, and Vibe Blogging – O’Reilly

    Technology

    Robot Videos: Cargo Robots, Robot Marathons, and More

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    The Future

    TLcom Capital closes second fund at $154M to back early-stage startups across Africa

    Venture capital exercise in Africa has proven resilience over the previous six months, with main…

    Crypto

    El Salvador Adds Cryptocurrency As Core Subject

    Bitcoin (BTC) is about to make a major influence on the tutorial panorama of El…

    Mobile

    Apple’s iOS 18.5 beta update is pretty barebones, but more important than it seems

    Apple has simply began rolling out the iOS 18.5 beta to builders, and whereas it’s…

    Mobile

    Xiaomi 13T series listed by European retailer

    The Xiaomi 13T series is because of launch later this month on September 26 however…

    Science

    A New Generation of Materials to Harvest Water Vapor

    One manner or one other, each residing being on our planet relies on water. That’s…

    Our Picks
    Mobile

    14″ and 16″ Redmi Book Pro 2024 launch with Intel Core Ultra CPUs and new AI powers

    Crypto

    The Solana Foundation Asserts Ability to Address Offensive Meme Coins Issue

    AI

    Meet Hydragen: A Hardware-Aware Exact Implementation of Attention with Shared Prefixes

    Categories
    • AI (1,482)
    • Crypto (1,744)
    • Gadgets (1,796)
    • Mobile (1,839)
    • Science (1,853)
    • Technology (1,789)
    • The Future (1,635)
    Most Popular
    Mobile

    I have high expectations for the Samsung Galaxy Ring

    The Future

    Ember Smart Mug Review: Ember’s Self-Heated Mug Changed My Mornings

    Science

    A glimpse inside how the James Webb Space Telescope was put together

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.