-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cyber Security Tip ST08-001 Using Caution with USB Drives USB drives are popular for storing and transporting data, but some of the characteristics that make them convenient also introduce security risks. What security risks are associated with USB drives? Because USB drives, sometimes known as thumb drives, are small, readily available, inexpensive, and extremely portable, they are popular for storing and transporting files from one computer to another. However, these same characteristics make them appealing to attackers. One option is for attackers to use your USB drive to infect other computers. An attacker might infect a computer with malicious code, or malware, that can detect when a USB drive is plugged into a computer. The malware then downloads malicious code onto the drive. When the USB drive is plugged into another computer, the malware infects that computer. Some attackers have also targeted electronic devices directly, infecting items such as electronic picture frames and USB drives during production. When users buy the infected products and plug them into their computers, malware is installed on their computers. Attackers may also use their USB drives to steal information directly from a computer. If an attacker can physically access a computer, he or she can download sensitive information directly onto a USB drive. Even computers that have been turned off may be vulnerable, because a computer's memory is still active for several minutes without power. If an attacker can plug a USB drive into the computer during that time, he or she can quickly reboot the system from the USB drive and copy the computer's memory, including passwords, encryption keys, and other sensitive data, onto the drive. Victims may not even realize that their computers were attacked. The most obvious security risk for USB drives, though, is that they are easily lost or stolen (see Protecting Portable Devices: Physical Security for more information). If the data was not backed up, the loss of a USB drive can mean hours of lost work and the potential that the information cannot be replicated. And if the information on the drive is not encrypted, anyone who has the USB drive can access all of the data on it. How can you protect your data? There are steps you can take to protect the data on your USB drive and on any computer that you might plug the drive into: * Take advantage of security features - Use passwords and encryption on your USB drive to protect your data, and make sure that you have the information backed up in case your drive is lost (see Protecting Portable Devices: Data Security for more information). * Keep personal and business USB drives separate - Do not use personal USB drives on computers owned by your organization, and do not plug USB drives containing corporate information into your personal computer. * Use and maintain security software, and keep all software up to date - Use a firewall, anti-virus software, and anti-spyware software to make your computer less vulnerable to attacks, and make sure to keep the virus definitions current (see Understanding Firewalls, Understanding Anti-Virus Software, and Recognizing and Avoiding Spyware for more information). Also, keep the software on your computer up to date by applying any necessary patches (see Understanding Patches for more information). * Do not plug an unknown USB drive into your computer - If you find a USB drive, give it to the appropriate authorities (a location's security personnel, your organization's IT department, etc.). Do not plug it into your computer to view the contents or to try to identify the owner. * Disable Autorun - The Autorun feature causes removable media such as CDs, DVDs, and USB drives to open automatically when they are inserted into a drive. By disabling Autorun, you can prevent malicious code on an infected USB drive from opening automatically. In How to disable the Autorun functionality in Windows, Microsoft has provided a wizard to disable Autorun. In the "More Information" section, look for the Microsoft Fix it icon under the heading "How to disable or enable all Autorun features in Windows 7 and other operating systems." _________________________________________________________________ Author: Mindi McDowell _________________________________________________________________ Produced 2008, 2011 by US-CERT, a government organization. Terms of use US-CERT Note: This tip was previously published and is being re-distributed to increase awareness. Terms of use http://www.us-cert.gov/legal.html This document can also be found at http://www.us-cert.gov/cas/tips/STYY-XXX.html For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTbnXeT6pPKYJORa3AQLZXAgAt9opl+cYhBW5bWpZOqt9rivhu3RYXCbA 5UGLuIlYWc2AlsL1TwommeKDNQUtVV/dxuRfowNzHasNtqS5G8DFc8RtHFuC9WGy kKFsLNpogMTwwoaBTj/S+C23hJ49Sv0FAyYrelwzLtKRJR5sofpW5y1GPodvos/3 blXU/I7v23hzaxk9CZAJkE4jQmTLEZJUVSTDyTHbY6LJtjBmweixj+Eq15gSUN95 mhPojCAfZgtIbQ33jAhIE7jy/HODHjcApAKo0ccASrp3KBSPh9eI0iIqeAud6cdG IKyP4s9Z3QbYPUhac0BF/bBsApey9Z7mzrCWvQ65ea7Dhj3n237btA== =E5pB -----END PGP SIGNATURE-----