A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there.

A new ESET study of 17 malware frameworks that threat actors have used over the past decade to target air-gapped systems showed every one of them used a USB drive to introduce malware into the environment and extract data from there. The security vendor found that the best defense for organizations against attacks on air-gapped systems is to restrict USB use as much as possible and to monitor them closely in situations where the devices need to be used.

https://www.eset.com/ca/about/newsroom/press-releases/eset-research-analyzes-malicious-frameworks-targeting-air-gapped-networks-dissects-15-years-of-nati-2/

Read more

Hello All. Anyone out there using Apple’s AirTags? AirTags use ultra-wideband technology and take advantage of Apple’s existing network of devices, which work as crowdsourced beacons to ping each other in order to determine your missing item’s location.

I stumbled across a really interest YouTube channel called MegaLag out of Germany. Really enjoyed the content. There are a number of videos including, “I sent an AirTag to North Korea, Tim Cook and Elon Musk!”.  Enjoy!

 

Part 1

 

Part 2

 

Part 3

\

Read more