Skip to main content

Honeynet looks to trap USB malware

posted onJune 18, 2012
by l33tdawg

The Honeynet project has picked up research by a German student to trap malware designed to spread via USB keys. 

USB-distributed malware – like Stuxnet and its bloated cousin, Flame – presents problems for network-based security, since they don’t spread through the network.

The Bonn University student, Sebastian Peoplau, has now been added to the Honeynet project as Ghost-usb-honeypot, here. Like network honeypots, which emulate network clients to invite infection, the new project emulates USB flash drives to invite infection – via the USB drive rather than via the network. The problem with trying to trap such malware is that it’s not practical to hand-test every machine in a network – especially a large network.

Source

Tags

Honeynet Viruses & Malware

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th