Common Information
Type Value
Value
Replication Through Removable Media
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may move onto systems, such as those separated from the enterprise network, by copying malware to removable media which is inserted into the control systems environment. The adversary may rely on unknowing trusted third parties, such as suppliers or contractors with access privileges, to introduce the removable media. This technique enables initial access to target devices that never connect to untrusted networks, but are physically accessible. Operators of the German nuclear power plant, Gundremmingen, discovered malware on a facility computer not connected to the internet. The malware included Conficker and W32.Ramnit, which were also found on eighteen removable disk drives in the facility. The plant has since checked for infection and cleaned up more than 1,000 computers.9 An ESET researcher commented that internet disconnection does not guarantee system safety from infection or payload execution.
Details Published Attributes CTI Title
Details Website 2024-11-04 57 Threat Intelligence Report October 29 - November 4 2024 | Red Piranha
Details Website 2024-11-01 62 Weekly Intelligence Report - 01 Nov 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-07 141 Mind the (air) gap: GoldenJackal gooses government guardrails
Details Website 2024-10-06 29 Blue Team Labs Online — Suspicious USB Stick Challenge Walkthrough
Details Website 2024-09-25 24 Zero Trust Protections - Illustrated
Details Website 2024-09-09 41 Earth Preta Evolves its Attacks with New Malware and Strategies
Details Website 2024-09-09 41 Earth Preta Evolves its Attacks with New Malware and Strategies
Details Website 2024-02-20 137 Earth Preta Campaign Uses DOPLUGS to Target Asia
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-11-09 53 Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology | Mandiant
Details Website 2023-10-31 18 More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities
Details Website 2023-08-25 195 Russia/Ukraine Update - August 2023
Details Website 2023-08-24 119 Identifying ADHUBLLKA Ransomware: LOLKEK, BIT, OBZ, U2K, TZW Variants
Details Website 2023-07-28 0 What is Lateral Movement in Security
Details Website 2023-07-21 0 Tropic Trooper TryHackMe Write-Up
Details Website 2023-07-06 239 Increased Truebot Activity Infects U.S. and Canada Based Networks | CISA
Details Website 2023-06-28 2 Staff Picks for Splunk Security Reading June 2023
Details Website 2023-03-23 29 BlackGuard stealer extends its capabilities in new variant - Cybersecurity Insiders
Details Website 2023-03-23 78 Earth Preta Updated Stealthy Strategies
Details Website 2023-03-23 78 Earth Preta Updated Stealthy Strategies
Details Website 2023-03-23 80 Earth Preta Updated Stealthy Strategies
Details Website 2023-01-31 29 Anomali Cyber Watch: KilllSomeOne Folders Invisible in Windows, Everything APIs Abuse Speeds Up Ransomware,  APT38 Experiments with Delivery Vectors and Backdoors
Details Website 2022-11-16 63 ARCrypter Ransomware Expands Its Operations From Latin America to the World
Details Website 2022-10-04 0 8 strange ways employees can (accidently) expose data
Details Website 2022-09-23 35 What Is Initial Access? MITRE ATT&CK® Initial Access Tactic | TA0001 - SOC Prime