Honeynet looks to trap USB malware
The Honeynet project has picked up research by a German student to trap malware designed to spread via USB keys.
USB-distributed malware – like Stuxnet and its bloated cousin, Flame – presents problems for network-based security, since they don’t spread through the network.
The Bonn University student, Sebastian Peoplau, has now been added to the Honeynet project as Ghost-usb-honeypot, here. Like network honeypots, which emulate network clients to invite infection, the new project emulates USB flash drives to invite infection – via the USB drive rather than via the network. The problem with trying to trap such malware is that it’s not practical to hand-test every machine in a network – especially a large network.
- Sun, 2013-05-19 23:17
- Tue, 2013-04-23 06:38
- Wed, 2013-04-17 14:39