Cyber Threats Targeting Removable Media Up 52%: USB Threat Report

by | Aug 21, 2022

USB Threat Report, USB Media

Image Source: Freepik.com

August 19, 2022 – The threat of USB-borne malware continues to be a serious concern. Data from the 2022 Honeywell Industrial Cybersecurity USB Threat Report indicates that 52% of threats were specifically designed to utilize removable media, up from 32% the previous year and more than double the 19% reported in the 2020 study, clearly indicating that the threats designed to use removable media have reached a dangerously high level.

Now in its fourth year, the Honeywell Industrial Cybersecurity USB Threat Report shows a clear trend: cybersecurity threats continue to be more prominent and more potent. According to the report, threats designed to establish remote access capabilities remained steady at 51%, while the number of threats designed specifically to target industrial control systems increased slightly year over year, up from 30% to 32%. At the same time, the malware was more capable of causing a disruption to industrial control systems, climbing to 81% compared to 79% the previous year.

The current report was based on aggregated cybersecurity threat data from hundreds of industrial facilities globally during a 12-month period. Along with USB attacks, the research highlights that Trojans remain a top concern because of their potential to cause severe disruption to industrial infrastructure, comprising 76% of the malware detected.

“This year’s report indicates that adversaries are deliberately leveraging removable media as an initial attack vector to establish remote connectivity, exfiltrate data, and establish command and control,” said Jeff Zindel, vice president and general manager, Honeywell Connected Enterprise Cybersecurity. “It’s now painfully clear that USB removable media are being used to penetrate industrial/OT environments, and that organizations must adopt formal programs to defend against this type of threat to avoid costly disruptions.”

For the fourth year in a row, the threats attempting to enter industrial/OT environments have continued to increase in sophistication and frequency with USB-borne malware clearly being leveraged as part of larger cyberattack campaigns. Hackers are taking advantage of USB removable media to circumvent network defenses and bypass the air gaps upon which many of these facilities depend upon for protection. Continued diligence is necessary to defend against the growing USB threat and strong USB security controls are highly recommended.

 

Share This Article!

Brian Pereira
Brian Pereira
Brian Pereira is an Indian journalist and editor based in Mumbai. He founded Digital Creed in 2015. A technology buff, former computer instructor, and software developer, Brian has 29 years of journalism experience (since 1994). Brian is the former Editor of CHIP India, InformationWeek India and CISO Mag. He has served India's leading newspaper groups: The Times of India and The Indian Express. Presently, he serves the Information Security Media Group, as Sr. Director, Editorial. You'll find his most current work on CIO Inc. During his career he wrote (and continues to write) 5000+ technology articles. He conducted more than 450 industry interviews. Brian writes on aviation, drones, cybersecurity, tech startups, cloud, data center, AI/ML/Gen AI, IoT, Blockchain etc. He achieved certifications from the EC-Council (Certified Secure Computer User) and from IBM (Basics of Cloud Computing). Apart from those, he has successfully completed many courses on Content Marketing and Business Writing. He recently achieved a Certificate in Cybersecurity (CC) from the international certification body ISC2. Follow Brian on Twitter (@creed_digital) and LinkedIn. Email Brian at: [email protected]
Recommended Posts
The Rise of AI Agents in Business

AI agents are revolutionizing how businesses operate, innovate, and engage with customers while reshaping workforce dynamics and decision-making processes.

The First 90 Days Are Crucial for the CISO and CIO

This book arms you with insights into crafting a robust 90-day plan, and you’ll be well-equipped to catapult into CIO or CISO roles successfully. Beyond technical proficiency, the book instills survival skills, ensuring longevity and helping you prevent burnout in these pivotal positions.

Similar Articles