If you think that there was a protection on your computer which is not connected to the Internet, then this myth has now fallen to the ground, a new malware was discovered that can attack this type of computers even in offline mode. The USB Thief is probably the most complex trojan that has ever been discovered, using encryption and self-protection to infect their victims and to hide from who tries to detect them. It was created to be propagated with the use of USB sticks, so, they can easily access the computer which is not accessible from the Internet and thus they can steal more sensitive information. It uses very interesting ways to hide, they use portable applications like Firefox, NotePad++ and TrueCrypt to reach the victim’s computer. Once they reach the system, which they want to attack, the USB Thief starts stealing all the essential data and information from the victim’s computer.
Are you waiting for a way to remove the information from the infected computer?
But if you are thinking that the separation of your data from your system is the solution, then you are wrong, as the USB Thief normally turns to pass the information out through the same USB key, and this process is repeated several times whenever the pen is connected to the computer. The USB Thief is a malware which consists of several stages, and currently three executable processes are there for this type of tasks. Each of them is given the task of managing a component, connecting altogether. Two of these components contain two files which are encrypted and assigned for the infection process. And the latter one is assigned for identifying the information which was targetted to be stolen. However, where they were stored and due to the encryption, they remain undetected. The way it was created and the number of methods it uses, it makes it extremely difficult to analyze the USB Thief and also very complicated to identify the point of origin to remove the USB Thief from the computer. The discovery of this new malware proves that there is very less and less number of invulnerable computers due to which the attackers can create unique versions of this malware to steal data.
Δ