FBI: Cybercriminals Mailing Malicious USB Devices to Victims

The financially-motivated hacking group FIN7 has started mailing malicious USB devices to intended victims in an effort to infect their computers with malware, the FBI warns.


Active since at least 2015, the cybercrime group has been focused on stealing credit card information from businesses worldwide. The hackers were indicted in the United States for targeting more than 100 U.S. companies in sectors such as restaurant, gaming, and hospitality.


Mainly targeting businesses via phishing emails, the cybercrime group appears to have changed tactics recently, and started sending malicious USB devices to victims via the United States Postal Service (USPS).


Sometimes, the hackers also included items like teddy bears or gift cards in packages meant for employees in human resources, IT, or executive management roles at the target organizations, the FBI alert reads.


The malicious USB devices are a commercially available tool called “BadUsb Beetle.” They are based on the BadUSB exploit and they can allow attackers to take control of the victim’s machine.


Publicly detailed in 2014 by researchers at Germany-based SRLabs, the BadUSB exploit was meant to demonstrate the threat posed by malicious USB devices. The researchers showed at the time how BadUSB could be used to send commands on behalf of the victim, thus allowing attackers to steal data, install malware, and infect other USB devices.


According to the FBI's alert, once FIN7’s intended victims plug it into a machine, the USB device starts to automatically inject a series of keystrokes to download and execute the GRIFFON malware, a payload FIN7 often delivers via phishing emails.


“The USB injects a series of keystroke commands, including the (Windows + R) shortcut to launch the Windows Run Dialog to r ..

Support the originator by clicking the read the rest link below.