www.techrepublic.com Open in urlscan Pro
2a04:4e42:400::347  Public Scan

Submitted URL: https://click.checkpoint.com/NzUwLURRSC01MjgAAAGOdb-aEeOqil8I73wj4mnLf217T0dgqUXI3hsyTz36YRjLMvIfaQiKupn6wdbYaAlJObEWcy4=
Effective URL: https://www.techrepublic.com/article/check-point-hackers-usb/?mkt_tok=NzUwLURRSC01MjgAAAGOdb-aEfcbkLfQBWW3sAX0jWbRw9J3IoOzwxN...
Submission: On September 27 via api from ES — Scanned from ES

Form analysis 3 forms found in the DOM

/search/

<form action="/search/" class="search-bar">
  <label id="label-nav-site-search" for="nav-site-search"> Search </label>
  <input type="search" autocomplete="off" name="q" id="nav-site-search" value="" placeholder="What are you looking for?" required="">
  <button type="submit" disabled="disabled">
    <svg role="img" aria-labelledby="label-nav-site-search">
      <use href="#smart-search-icon"></use>
    </svg>
  </button>
</form>

POST

<form class="share-email-form" method="post">
  <input type="hidden" name="share-email-title" value="Check Point: Hackers Are Dropping USB Drives at Watering Holes">
  <input type="hidden" name="share-email-url" value="https://www.techrepublic.com/article/check-point-hackers-usb/">
  <input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
  <input type="email" name="to-email" class="read-write" placeholder="Recipient Email" required="">
  <textarea name="msg" class="readonly">Check out this article I found on TechRepublic.</textarea>
  <input type="submit" value="Submit">
  <p class="response-msg">Your email has been sent</p>
</form>

POST

<form class="share-email-form" method="post">
  <input type="hidden" name="share-email-title" value="Check Point: Hackers Are Dropping USB Drives at Watering Holes">
  <input type="hidden" name="share-email-url" value="https://www.techrepublic.com/article/check-point-hackers-usb/">
  <input type="email" name="from-email" class="read-write" placeholder="Your Email" required="">
  <input type="email" name="to-email" class="read-write" placeholder="Recipient Email" required="">
  <textarea name="msg" class="readonly">Check out this article I found on TechRepublic.</textarea>
  <input type="submit" value="Submit">
  <p class="response-msg">Your email has been sent</p>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may access more
detailed information and change your preferences before consenting or to refuse
consenting. Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to this website only. You can change your preferences at
any time by returning to this site or visit our privacy policy.
MORE OPTIONSAGREE
Skip to content



TECHREPUBLIC

Search Close
Search
 * Top Products Lists
 * AI
 * Developer
 * Payroll
 * Security
 * Project Management
 * TechRepublic Academy
 * Innovation
 * Cheat Sheets
 * Big Data
 * Tech Jobs

Toggle TechRepublic mobile menu More
 * TechRepublic Premium
 * Top Products Lists
 * AI
 * Developer
 * Payroll
 * Security
 * Project Management
 * TechRepublic Academy
 * Innovation
 * Cheat Sheets
 * Big Data
 * Tech Jobs
 * See All Topics

 * Sponsored
 * Newsletters
 * Forums
 * Resource Library

TechRepublic Premium
Join / Sign In


ACCOUNT INFORMATION

TechRepublic close modal
Image: Timon/Adobe Stock


CHECK POINT: HACKERS ARE DROPPING USB DRIVES AT WATERING HOLES

   
 * 
   
 * 
 * 
 * 


 * ACCOUNT INFORMATION
   
   TechRepublic close modal
   
   
   SHARE WITH YOUR FRIENDS
   
   Check Point: Hackers Are Dropping USB Drives at Watering Holes
   
   Check out this article I found on TechRepublic.
   
   Your email has been sent

by Karl Greenberg in Security
on September 12, 2023, 12:49 PM EDT


CHECK POINT: HACKERS ARE DROPPING USB DRIVES AT WATERING HOLES

Check Point's Global CISO discusses the firm's 2023 threat intelligence,
including new AI malice and threat actors spreading malware by dropping flash
drives.

Image: Timon/Adobe Stock

In its 2023 Mid-Year Cyber Security Report, Check Point Software spotlighted
numerous exploits so far this year, including novel uses of artificial
intelligence and an old-school attack vector: USB drives. Cybercriminals and
nation-state actors see these devices as the best way to infect air gapped,
segmented and protected networks, according to Check Point.

The report’s authors noted the Raspberry Robin worm was one of the common
malware variants distributed through USB drives via “autorun.inf” files or
clickable LNK files. Check Point also reported that state-aligned threat actors
are even launching 10-year-old infections such as ANDROMEDA via USB drives.

China-related espionage threat actor Camaro Dragon, for example, used USB drives
as a vector to infect organizations all over the world, according to the
report’s authors. In addition, the security researchers pointed out that
Russian-aligned group Gamaredon used USB drive-delivered Shuckworm to target
Ukrainian military and associated individuals.

I spoke with Pete Nicoletti, global chief information security officer for the
Americas at Check Point Software, about some other top-line findings from the
report. Nicoletti, who has more than 30 years in the field, said AI is a game
changer, and that out of Check Point Software’s 70-plus engines, AI and machine
learning drives 40 of them. The following transcript of my interview with
Nicoletti has been edited for length and clarity.

Jump to:

 * Found an orphan USB? Better to leave it be
 * Bad bots: AI for spam, spearphishing and malware
 * AI for the defense: Finding spam, insurance reviews, penetration tests
 * Education sector is the top target
 * Microsoft: A big house with many doors and “Windows”
 * Sound and vision: The next AI threats


FOUND AN ORPHAN USB? BETTER TO LEAVE IT BE

Karl Greenberg: I was surprised by the report’s details around physical USB
drivers as a viable attack vector. Really? Today?

Pete Nicoletti, global chief information security officer for the Americas at
Check Point Software.

Pete Nicoletti: As a former penetration tester, I thought the days of USB
drivers… USB devices being used to hack were going to go away, but we’ve seen a
big uptick in companies falling for a USB drive insertion. When I used to try to
break into companies, we used a watering hole attack: You go to the bar where
the employees go, you go to the office building or bathroom where the employees
go, and you drop a couple of USBs (it used to be CDs, with labels saying “3rd
quarter layoffs” and people would grab them). We are seeing the same thing
happening with flash drives, and this is dramatic.

Karl Greenberg: Hackers are physically leaving USB drives around?

Pete Nicoletti: Yes, and this tactic is infecting organizations. Before COVID,
we used to have better policies against using USBs in corporate-owned laptops,
because that laptop would be inspected. Post COVID, it’s BYO device, and there
are fewer corporate protections, so that’s partly why we’re seeing a spike.
Also, we’re seeing an uptick in hacktivism with politically motivated groups
launching attacks and artificial intelligence misuse such as using AI to craft
emails. We just saw the release of an AI-based keystroke monitoring tool that
has about 85% to 95% accuracy in understanding the keystroke just by sound.


BAD BOTS: AI FOR SPAM, SPEARPHISHING AND MALWARE

Karl Greenberg: How important are AI tools today for cybersecurity
practitioners, and what do you see as key ways hackers are using it?

Pete Nicoletti: If you don’t have artificial intelligence to battle artificial
intelligence, you’re going to be a statistic, because AI is lowering the bar for
the attackers. Just for spam, as an example, there are a lot more (non-English
speaking) people now who can create emails using really good English.

Basically, hackers are using AI in at least two ways: They are using AI to write
snippets of code rather than full-blown ransomware programs for, say, a zero day
for a given common vulnerability and exposure; they are using it, for example,
to write a keyboard stroke collector. And they are using AI to automate spam
creation using hacked data to generate content. These could, for example, be
tied to hacked private information about a patient’s information that may have
been part of a large breach; hackers are using such data to create personalized
emails: “You were just in for such and such a procedure, and you owe an
additional $200 on the bill.”

SEE: Check Point announces raft of 2023 AI features (TechRepublic)


AI FOR THE DEFENSE: FINDING SPAM, INSURANCE REVIEWS, PENETRATION TESTS

Karl Greenberg: How do you prevent or defend against these forms of AI-powered,
spearphishing campaigns?

Pete Nicoletti: All of our big carrier customers use Avanan, an AI-powered
(email security) tool we acquired two years ago. With it, we are able to
discover new kinds of challenging-to-find spam — and spam is still 89% the
vector of choice for successful attacks.

SEE: Check Point’s Avanan spotlights how business email compromise attacks
emulate legitimate web services to lure clicks (TechRepublic)

Karl Greenberg: Besides use for reducing analyst workloads, where else are you
seeing AI being used more today?

Pete Nicoletti: We’re seeing people use ChatGPT and other large language models
to review their cyber insurance programs. We’re seeing people use it to write up
penetration tests to give them more relevance and a deeper understanding of
certain issues. If you’re not using artificial intelligence, you’re not going to
be competitive.


EDUCATION SECTOR IS THE TOP TARGET

Karl Greenberg: What are the other top-line findings from the first half of the
year?

Pete Nicoletti: We’re seeing the education sector being the number one attack
vertical; we’ve seen a huge spike in this.

Karl Greenberg: Why?

Pete Nicoletti: A couple of reasons, including schools transitioning to
outsourced IT and using more online education tools. Also, educational
institutions don’t have the budgets the commercial sector has. We have seen at
least one university go out of business for the first time (Lincoln College in
May 2022) because of ransomware demands. Globally, education and research are
still the top targets for attacks (Figure A).

Figure A

Global average of weekly attacks per organization by industry in H1 2023 (change
in percentage from H1 2022). Image: Check Point Software


MICROSOFT: A BIG HOUSE WITH MANY DOORS AND “WINDOWS”

Karl Greenberg: I noticed the number of vulnerabilities in commonly used
corporate software is very high; Microsoft is number one. Why does Microsoft
have so many CVEs?

Pete Nicoletti: Someone famously said they rob banks because that’s where the
money is. If you’re a hacker, you want to target Microsoft because it’s so
ubiquitous. It’s everywhere — an application developing company and an operating
system. It’s used by everyone. So if you’re going to find a zero day, whether
you’re a state-sponsored hacking group or just a 16-year-old in the basement
wearing a hoodie, you’re going to be targeting Microsoft.

The other thing a lot of people don’t talk about: when you turn the knob as a
company to push products out the door, because companies can take all the time
in the world to develop something and test it, but companies want to release
products now, not tomorrow. And when they turn the knob to be competitive and
gain market share, this is the unspoken kind of risk of development that gets
you in trouble.

Karl Greenberg: Which is why AI tools in DevOps are critical.

Pete Nicoletti: Companies with fast development shops are picking up these tools
to increase security of their development pipeline, containers and Kubernetes,
and it’s so much cheaper to fix in the development pipeline rather than in the
test or production environment. So companies are finally figuring that out.


SOUND AND VISION: THE NEXT AI THREATS

Karl Greenberg: What about other uses of AI for threats beyond text and code
generation?

Pete Nicoletti: We have always been dealing with business email compromise;
well, now it’s going to be voice compromise and video compromise. It’s
absolutely coming. We’re going to start seeing a lot more photos converted to a
video discussion. We’ve seen voice compromises already, and every bank that’s
using voice confirmation and voice identification can be fooled now. So, if you
have credit cards or banks that use this? Say goodbye. I wouldn’t enable that at
all any more.


SUBSCRIBE TO THE CYBERSECURITY INSIDER NEWSLETTER

Strengthen your organization's IT security defenses by keeping abreast of the
latest cybersecurity news, solutions, and best practices.

Delivered Tuesdays and Thursdays
Sign up today
Karl Greenberg
Published:  September 12, 2023, 12:49 PM EDT Modified:  September 12, 2023, 3:15
PM EDT See more Security articles


ALSO SEE

 * DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security
   Vulnerabilities (TechRepublic)
 * How Generative AI is a Game Changer for Cloud Security (TechRepublic)
 * Network security policy (TechRepublic Premium)
 * Cybersecurity: More must-read coverage (TechRepublic on Flipboard)

WHITE PAPERS, WEBCASTS, AND DOWNLOADS

LIFETIME LICENSE: MICROSOFT OFFICE HOME & BUSINESS FOR MAC

Tools & Templates from TechRepublic Academy
Learn More

MANAGING AI AND ML IN THE ENTERPRISE 2020: TECH LEADERS INCREASE PROJECT
DEVELOPMENT AND IMPLEMENTATION

Research from TechRepublic Premium
Download Now

CHECKLIST: MICROSOFT 365 APP AND SERVICES DEPLOYMENTS ON MACS

Tools & Templates from TechRepublic Premium
View This Now

ISCANNER APP: LIFETIME SUBSCRIPTION

Tools & Templates from TechRepublic Academy
Find Out More

MORE ROBOT AND ROBOTIC SYSTEM DEPLOYMENTS EXPECTED ACROSS INDUSTRIES

Research from TechRepublic Premium
Download Now



   
 * 
   
 * 
 * 
 * 


 * ACCOUNT INFORMATION
   
   TechRepublic close modal
   
   
   SHARE WITH YOUR FRIENDS
   
   Check Point: Hackers Are Dropping USB Drives at Watering Holes
   
   Check out this article I found on TechRepublic.
   
   Your email has been sent

Share: Check Point: Hackers Are Dropping USB Drives at Watering Holes
By Karl Greenberg
Karl is a lead writer on cloud security for TechRepublic, specializing in
enterprise security risks, strategies, products, threats, trends and
technologies for securing organizations. After receiving a BA in comparative
religions from Florida State University, he worked for the Tampa Tribune, and
radio and TV stations in Tallahassee before moving to Boulder, Colorado, where
he pursued his interests in acting at Denver theaters. After receiving an MFA in
dramatic writing from Brooklyn College he became a journalist and wrote for
several years for publications covering the automotive, industrial chemical,
internet tech and consumer marketing verticals. He has written for Adweek,
Brandweek, The Chemical Market Reporter and MediaPost, and was also the public
affairs officer at the NYU Tandon School of Engineering for six years prior to
coming to TA.
 * |
 * See all of Karl's content


 * Artificial Intelligence
 * DevOps
 * Hardware
 * International
 * Microsoft
 * Security


EDITOR'S PICKS

 * Abstract polygonal lamp on digital background. Idea and innovation concept.
   3D Rendering
   TechRepublic Premium
   
   
   TECHREPUBLIC PREMIUM EDITORIAL CALENDAR: POLICIES, CHECKLISTS, HIRING KITS
   AND RESEARCH FOR DOWNLOAD
   
   TechRepublic Premium content helps you solve your toughest IT issues and
   jump-start your career or next project.
   
   TechRepublic Staff
   Published:  September 1, 2023, 4:30 AM EDT Modified:  September 1, 2023, 6:52
   AM EDT Read More See more TechRepublic Premium articles
 * Image: putilov_denis/Adobe Stock
   Artificial Intelligence
   
   
   MICROSOFT’S FIRST GENERATIVE AI CERTIFICATE IS AVAILABLE FOR FREE
   
   Microsoft is also running a grant competition for ideas on using AI training
   in community building.
   
   Megan Crouse
   Published:  July 28, 2023, 3:18 PM EDT Modified:  July 28, 2023, 3:48 PM EDT
   Read More See more Artificial Intelligence articles
 * Image: issaronow/Adobe Stock
   Cloud Security
   
   
   HOW GENERATIVE AI IS A GAME CHANGER FOR CLOUD SECURITY
   
   Generative AI will be a game changer in cloud security, especially in common
   pain points like preventing threats, reducing toil from repetitive tasks, and
   bridging the cybersecurity talent gap.
   
   Sue Poremba
   Published:  June 29, 2023, 12:34 PM EDT Modified:  June 30, 2023, 3:40 PM EDT
   Read More See more Cloud Security articles
 * Image: TarikVision/Adobe Stock
   Payroll
   
   
   THE 8 BEST INTERNATIONAL PAYROLL SERVICES FOR 2023
   
   Does your business need a payroll provider that offers international payroll
   services? Use our buyer's guide to review the best solutions, from ADP to
   Oyster.
   
   Madeline Clarke
   Published:  July 10, 2023, 7:28 AM EDT Modified:  September 26, 2023, 12:51
   AM EDT Read More See more Payroll articles
 * Image: irissca/Adobe Stock
   Artificial Intelligence
   
   
   CHATGPT CHEAT SHEET: COMPLETE GUIDE FOR 2023
   
   Get up and running with ChatGPT with this comprehensive cheat sheet. Learn
   everything from how to sign up for free to enterprise use cases, and start
   using ChatGPT quickly and effectively.
   
   Megan Crouse
   Published:  September 25, 2023, 11:00 AM EDT Modified:  September 25, 2023,
   11:01 AM EDT Read More See more Artificial Intelligence articles
 * Image: monticellllo/Adobe Stock
   Project Management
   
   
   6 BEST MONDAY.COM COMPETITORS AND ALTERNATIVES FOR 2023
   
   Looking for an alternative to monday.com? Our comprehensive list covers the
   best monday alternatives, their key features, pricing, pros, cons and more.
   
   Ali Azhar
   Published:  July 6, 2023, 1:00 AM EDT Modified:  August 21, 2023, 5:37 PM EDT
   Read More See more Project Management articles




SUBSCRIBE TO THE CYBERSECURITY INSIDER NEWSLETTER

Strengthen your organization's IT security defenses by keeping abreast of the
latest cybersecurity news, solutions, and best practices.

Delivered Tuesdays and Thursdays
Sign up today


TECHREPUBLIC PREMIUM

 * TechRepublic Premium
   
   
   IDENTITY THEFT PROTECTION POLICY
   
   Help protect your employees and customers from identity theft. This policy
   from TechRepublic Premium outlines precautions for reducing risk, signs to
   watch out for and steps to take if you suspect identity theft has occurred.
   While such misfortune may not be 100% preventable for everyone who follows
   these guidelines (since identity theft can still occur ...
   
   Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023,
   9:00 AM EDT Read More See more TechRepublic Premium articles
 * TechRepublic Premium
   
   
   HOME OFFICE DEDUCTION GUIDE AND CHECKLIST
   
   There are rules about what qualifies as a home office, what qualifies as a
   deductible expense and what method should be used to calculate the deduction
   assuming those rules and qualifications are met. This guide, and the
   accompanying checklist, from TechRepublic Premium will help you navigate the
   twists and turns of those regulations to arrive ...
   
   Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023,
   9:00 AM EDT Read More See more TechRepublic Premium articles
 * TechRepublic Premium
   
   
   QUICK GLOSSARY: MALWARE
   
   Malware is an insidious infection that will steal productivity from your
   enterprise and potentially wreak havoc on your network. To prevent and
   counteract malware, it’s important to know the terminology surrounding it.
   This list of terms from TechRepublic Premium will help you grasp the
   vocabulary that describes malware and the technology that spawns it. From ...
   
   Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023,
   9:00 AM EDT Read More See more TechRepublic Premium articles
 * TechRepublic Premium
   
   
   INTERNET OF THINGS POLICY
   
   The Internet of Things continues making inroads in the business world, so
   organizations should have a defined IoT structure in place to ensure that
   data and operations are properly secured. This policy from TechRepublic
   Premium provides guidelines for the procurement, usage and administration of
   IoT devices, whether company provided or employee-owned. From the policy:
   Since ...
   
   Downloads
   Published:  September 26, 2023, 4:00 PM EDT Modified:  September 27, 2023,
   9:00 AM EDT Read More See more TechRepublic Premium articles


SERVICES

 * About Us
 * Newsletters
 * RSS Feeds
 * Site Map
 * Site Help & Feedback
 * FAQ
 * Advertise
 * Do Not Sell My Information
 * Careers


EXPLORE

 * Downloads
 * TechRepublic Forums
 * Meet the Team
 * TechRepublic Academy
 * TechRepublic Premium
 * Resource Library
 * Photos
 * Videos

 * TechRepublic
 * TechRepublic on Twitter
 * TechRepublic on Facebook
 * TechRepublic on LinkedIn
 * TechRepublic on Flipboard

© 2023 TechnologyAdvice. All rights reserved.
 * Privacy Policy
 * Terms of Use
 * Property of TechnologyAdvice