Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trump officials vow to lift school separation orders

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Defense against USB drive attacks by Wazuh
Identity

Defense against USB drive attacks by Wazuh

userBy userMarch 5, 2025No Comments8 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

USB drive attacks provide malware and exploit the daily use of USB devices to avoid traditional network security measures, and constitute important cybersecurity risks. These attacks lead to data breaches, financial losses, and operational disruptions, which have a lasting impact on the organization’s reputation. For example, the StuxNet worm, discovered in 2010, is malware designed to target industrial control systems, particularly nuclear enrichment facilities in Iran. It exploits multiple zero-day vulnerabilities and spreads primarily through USB drives, making it one of the first examples of cyberattacks with real physical effects. Stuxnet has exposed the risks of removable media and has raised global awareness of cybersecurity threats to critical infrastructure.

How USB drive attacks propagate

Attackers use a variety of methods to provide malicious payloads through USB drives, targeting individuals and organizations.

Drop attack: Infected USB drives are intentionally left in public areas such as parking lots, seducing the victim and infecting the computer. Email-based attacks: USB drives are sent to the target with emails disguised as promotional items or legal devices, tricking them into connecting them to the system. Social Engineering: Attackers use psychological tactics to persuade the victim to connect an infected USB drive to a computer. Unsolicited Plug: Attackers plug the infected USB drive into an unmanned system, spreading the malware without victim interaction.

How a USB drive attacks

USB drive attacks usually follow a multi-step process to penetrate the system and cause damage.

Reconnaissance: Attackers investigate targets to identify potential vulnerabilities. In this case, they may gather information about the organization, its employees, and its operating environment to determine the possibility of anyone using a USB drive. Weaponization: Threat actors prepare a USB drive by embedding malware. This can be achieved by creating seemingly benign files, such as documents, videos, or images that infect the drive directly or contain hidden malicious code. Delivery: Attackers distribute infected USB drives to targets by dropping them into public areas and offering them as promotional items or delivering them using social engineering. Exploitation: When the target connects to a USB drive, the malware is automatically activated and activated via user interaction to exploit any system vulnerabilities. Installation: Malware is installed on the target system for persistence. This step allows an attacker to maintain control of an infected device even if it is restarted or disconnected. Commands and Controls (C2): Malware communicates with the attacker’s server. This allows an attacker to issue commands, remove data, and deploy additional payloads. Actions to Objectives: Attackers achieve their goals, including theft of sensitive data, deployment of ransomware, and establishing permanent access for future exploitation.

Figure 1: Procedures showing how a USB drive works.Figure 1: Procedures showing how a USB drive works.

Strengthen cybersecurity stance against USB drive attacks using Wazuh

Wazuh is an open source security platform that helps organizations detect and respond to security threats by monitoring system activity, from informational events to critical incidents. Organizations can actively prevent violations and protect sensitive data by monitoring USB activity using Wazuh.

Monitoring USB drive activity on Windows using Wazuh

Wazuh uses the Audit PNP Activity feature to monitor USB drive activity on Windows endpoints. This feature logs Plug and Play (PNP) events. This helps to identify that a USB drive is connected. Available for Windows 10 Pro and Windows 11 Pro, Windows Server 2016, and later versions.

Organizations can configure Wazuh to detect specific system events and monitor USB-related events. It focuses in particular on Windows Event ID 6416, which indicates when an external device is connected. Security administrators can detect USB device connections by creating Wazuh custom rules to identify potential security incidents.

The next step involves creating a constant database (CDB) for the unique device identifiers (DeviciD) of the authorized devices. This list allows Wazuh to distinguish between certified and rogue devices and generate alerts for both categories. For example, when an approved USB drive is plugged in, a low-level alert will be triggered, but an unauthorized connection can generate a sensitive alert that indicates a potential security breaches.

Figure 2: USB drive plugin event for monitored Windows endpoints.

Figure 3: Certified USB drive event.

Figure 4: Illegal USB drive event.

Threat detection Use Case: Detecting Raspberry Robin USB-Drive Activity

Wazuh offers solutions to mitigate USB-related threats, such as the Windows-based worm Raspberry Robin.

Raspberry Robin targets industries such as oil, gas, transportation and technology, causing operational disruptions. It spreads through impersonated .lnk files and gains persistence by updating the user-assist registry, mimicking legitimate folders. The worm runs, persists and downloads additional malicious components using legal Windows processes such as msiexec.exe, rundll32.exe, odbcconf.exe, fodhelper.exe, and more. Reliance on TOR-based command and control (C2) servers for outbound communications adds stealth and complicates detection.

Wazuh detects Raspberry Robin by using registry changes, unusual command execution patterns, and suspicious system binaries. Its real-time file integrity monitoring and threat detection rules allow for quick responses to identify malicious activity and mitigate potential disruptions.

Wazuh detects and mitigates Raspberry Robin by monitoring and responding to suspicious activities such as:

Abnormal CMD.exe activity: Termination of suspicious processes or isolation of affected endpoints. Download msiexec.exe from an obscure domain, block connections, and flag warning administrators. Detects UAC bypass via fodhelper.exe, terminates the process and notifies the administrator. Blocks abnormal outbound connections by rundll32.exe and dllhost.exe.

Below is a sample custom rule configuration that detects possible Raspberry Robin activities:

92004(?i)cmd\.exe $(?i)cmd\.exe. +((\/r)|(\/v \.+\/c)|(\/c)). (?i) msiexec. *(\/q | \ -q | \/i | \ -i). *(\/q | \ -q | \/i | \ -i). *http[s]{0,1} \:\/\/.+[.msi]{0,1} msiexec.exe $(win.system.computer)t1218.007 61603(?i)(cmd | powershell | rundll32)\T1548.002 61603(regsvr32\.exe | rundll32\.exe | dllhost\.exe).

Figure 5: Raspberry Robin IOC and behavior discovered on a monitored Windows endpoint.

Figure 6: An alert indicating the Raspberry Robin IOC detected on a monitored Windows endpoint.

For more information about using Wazuh to detect Raspberry Robin Worm, see this blog.

Monitor USB drives on Linux using Wazuh

USB drives can also introduce security risks to Linux endpoints as potential vectors of malware and unauthorized data access. Udev is a system utility on Linux that automatically detects and manages external devices such as USB drives. When plugging in, you create the required device files in the /dev directory so that the system can interact with them. Administrators can create custom UDEV rules that generate detailed events and provide insight into USB activity. Wazuh has built-in rules for USB monitoring, but events generated in Udev provide richer details and improve threat detection.

Whenever a USB device is connected, configure UDEV rules on the Linux endpoint to trigger a logging script. The Wazuh agent must be configured to read the generated JSON log files generated from the logging script, allowing USB activity to be processed and analyzed.

Just like monitoring Windows USB Drive, you need a certain database (CDB) list of approved USB device serial numbers. Wazuh compares the incoming connections to this list and triggers alerts for rogue devices.

Figure 7: USB drive alerts for monitored Linux endpoints.

Figure 8: Illegal USB drive event on a monitored Linux endpoint.

A blog post on monitoring USB drives on Linux using Wazuh provides detailed information on monitoring USB drives connected to Linux endpoints.

Monitoring your MacOS USB drive using Wazuh

You can use custom scripts to configure Wazuh to record important events related to USB devices on your MacOS endpoints and monitor these events. Administrators can extract information such as connection and disconnect events, vendor ID, product ID, and USB drive serial number. This script interacts with the MacOS I/O kit framework to collect USB device information. It is formatted as JSON and saved in a log file. The log data generated from this custom script is sent to the Wazuh server for analysis using the Wazuh agent.

A blog post on monitoring a MacOS USB drive using Wazuh provides instructions for monitoring a USB drive on a MacOS endpoint.

Figure 9: USB drive alerts on monitored MacOS endpoints.
Figure 10: Incorrect USB drive alerts at monitored MACOS endpoints.

Conclusion

USB drive attacks pose security risks across major operating systems, allowing malware propagation and malicious access.

Wazuh offers a variety of detection mechanisms to detect USB drive attacks and increase the likelihood of reducing potential impact. Organizations can enhance cybersecurity by integrating these detection methods and enforcing strict USB access policies.

reference

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJill Kit launches Garfield Testnet with Cancun and Pectra Opcodes and enhanced Pouver
Next Article Defense technology startup Epilus raises $250 million Series D to expand anti-drone weapons production amid rising global threats
user
  • Website

Related Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

June 8, 2025

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Malicious browser extensions will infect 722 users across Latin America since early 2025

Trump officials vow to lift school separation orders

Should the government ban AI-generated humans to stop the collapse of social trust?

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Should the government ban AI-generated humans to stop the collapse of social trust?

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.