Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A Secret Service agent inserted a USB drive infected with malware into his laptop [title truncated]
Business Insider ^ | April 8, 2019 | liza Relman

Posted on 04/08/2019 5:00:39 PM PDT by edwinland

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-89 next last
To: Two Kids' Dad

Billy, don’t be a hero, come back to me! Great song BTW.


61 posted on 04/08/2019 7:45:26 PM PDT by sgt_lau
[ Post Reply | Private Reply | To 36 | View Replies]

To: edwinland

There has been no secure chain of custody for the USB drive. Will it still be admissible as evidence against the spy?


62 posted on 04/08/2019 7:52:27 PM PDT by TChad
[ Post Reply | Private Reply | To 1 | View Replies]

To: InterceptPoint
Is it possible to load the equivalent of an autoexec.bat file on a thumb drive and have it start executing without any action by the user?

Yes. In fact you can build a "thumb drive" which carries along a simulated keyboard and use it to enter any commands you want, as well as deliver code.

The software that supports USB devices is not designed to be a hardened interface point to a computer.

63 posted on 04/08/2019 8:04:56 PM PDT by freeandfreezing
[ Post Reply | Private Reply | To 43 | View Replies]

To: TChad

Thanks for the link. The Smart Guys think it’s a serious threat.

But ...I still wonder how even a custom thumb drive with a built in CPU can start the execution of a file on that same thumb drive given an operating system that will not execute anything without user action.

But what I’m really wondering is: Did the idiot Secret Service Guy try to run one of the files on the thumb drive.


64 posted on 04/08/2019 8:08:52 PM PDT by InterceptPoint (Ted, you finally endorsed. A)
[ Post Reply | Private Reply | To 60 | View Replies]

To: freeandfreezing

Yes. In fact you can build a “thumb drive” which carries along a simulated keyboard and use it to enter any commands you want, as well as deliver code.
+++++
Yikes. Now I’ll never look at thumb drives the same way I did

Best explnation I’ve read..


65 posted on 04/08/2019 8:13:10 PM PDT by InterceptPoint (Ted, you finally endorsed. A)
[ Post Reply | Private Reply | To 63 | View Replies]

To: taxcontrol

” using special tools on hardened and isolated laptops.”

What if an Agent wants the FBI to buy him a new laptop?
:-)


66 posted on 04/08/2019 8:15:14 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 17 | View Replies]

To: edwinland
I doubt it is Stuxnet, which is widely agreed to have been developed by Israel & the U.S.

Relatively harmless to computers not involved in uranium enrichment.

When it infects a computer, it checks to see if that computer is connected to specific models of programmable logic controllers (PLCs) manufactured by Siemens. PLCs are how computers interact with and control industrial machinery like uranium centrifuges. The worm then alters the PLCs' programming, resulting in the centrifuges being spun too quickly and for too long, damaging or destroying the delicate equipment in the process. While this is happening, the PLCs tell the controller computer that everything is working fine, making it difficult to detect or diagnose what's going wrong until it's too late.

67 posted on 04/08/2019 8:30:30 PM PDT by Robert DeLong
[ Post Reply | Private Reply | To 1 | View Replies]

To: mrsmith

Unlikely as it would most likely be re-formated, re-imaged and returned to the agent.


68 posted on 04/08/2019 8:37:37 PM PDT by taxcontrol (Stupid should hurt - dad's wisdom)
[ Post Reply | Private Reply | To 66 | View Replies]

To: InterceptPoint
autorun.inf has been disabled on USB stick since at least Windows 7 for security reasons.

It will not work as this functionality was disabled to stop spreading malware.

So I assume he clicked on something to make it run. But if he was not connected to anything then just his computer is infected with the malware, period.

69 posted on 04/08/2019 8:54:39 PM PDT by Robert DeLong
[ Post Reply | Private Reply | To 43 | View Replies]

To: Robert DeLong

good points but i didn’t mean to allude to the actual virus Stuxnet but to it’s assumed method of communication to the not-web-connected Iranian nuclear program. it’s alleged that the virus was put on a usb drive and left in the facility for some unsuspecting employee to insert into a computer out of curiosity.


70 posted on 04/08/2019 9:01:04 PM PDT by edwinland
[ Post Reply | Private Reply | To 67 | View Replies]

To: Whenifhow; null and void; aragorn; EnigmaticAnomaly; kalee; Kale; 2ndDivisionVet; azishot; ...

p


71 posted on 04/08/2019 9:16:19 PM PDT by bitt (The pain IS coming!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: edwinland

I find it nothing short of amazing that anyone using a laptop in a professional setting like that wouldn’t have AutoStart disabled for USB.


72 posted on 04/08/2019 9:16:48 PM PDT by rockrr ( Everything is different now...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: InterceptPoint
...I still wonder how even a custom thumb drive with a built in CPU can start the execution of a file on that same thumb drive given an operating system that will not execute anything without user action.

There are security flaws in the underlying standard for USB devices.

Your "given" isn't really given.

73 posted on 04/08/2019 9:26:00 PM PDT by flamberge
[ Post Reply | Private Reply | To 64 | View Replies]

To: rockrr
Certain modifications to USB hardware can allow it to run malicious code in a system when the drivers are first loaded to recognize the device.

The "AutoStart" setting in a Windows system becomes completely irrelevant in this condition. So does all of the file protection features.

74 posted on 04/08/2019 9:34:00 PM PDT by flamberge
[ Post Reply | Private Reply | To 72 | View Replies]

To: taxcontrol
it would most likely be re-formated, re-imaged and returned to the agent.

You can never fully trust a computer system once it has been compromised. There are specialized malware payloads which can survive even reformatting and re-imaging, because they modify the firmware BIOS of the system.

Compromised systems used in critical security applications would most likely be physically destroyed as a matter of policy. Surely, the Government has lots of money for replacements....

75 posted on 04/08/2019 9:48:53 PM PDT by flamberge
[ Post Reply | Private Reply | To 68 | View Replies]

To: edwinland

That’s all good, but since Windows 7 you could no longer have an autorun.ini automatically run from a USB as that functionality was disabled to prevent the spread of malware through a USB. The Iran computers were first infected in 2007 and not discovered until 2010. The Windows operating system being used in 2007 was pre Windows 7. Thus you can’t do it by just inserting it anymore. He had to have clicked on something that started the attack on his computer.


76 posted on 04/08/2019 9:50:21 PM PDT by Robert DeLong
[ Post Reply | Private Reply | To 70 | View Replies]

To: flamberge

My estimation was not based on what should be done, but rather based on my level of experience with FBI / SS IT personnel.


77 posted on 04/08/2019 10:20:46 PM PDT by taxcontrol (Stupid should hurt - dad's wisdom)
[ Post Reply | Private Reply | To 75 | View Replies]

To: edwinland

Makes one wonder how long this bozo has been on the job. Sounds like some of obamy’s guys.


78 posted on 04/08/2019 10:29:17 PM PDT by bgill (when you badmouth women, you are badmouthing your mama and the good women on FR)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mass55th

“Something doesn’t sound right. Her cover story is TOO thin to be a real spy.

Does she work for Huawei?

Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

FF???

Competitor of huawei?? maybe?


79 posted on 04/08/2019 10:33:12 PM PDT by thinden
[ Post Reply | Private Reply | To 18 | View Replies]

To: taxcontrol
Well, that does not leave me with a warm fuzzy feeling.

You are confirming my vague impression that the bureaucrats do not consider operations of the Secret Service to be a "critical security application".

I hope there are some changes going on right now behind the scenes.

80 posted on 04/08/2019 10:33:31 PM PDT by flamberge
[ Post Reply | Private Reply | To 77 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-89 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson