"Malicious USB Drives Part of New Self-Propagating Malware Campaign"

Researchers have discovered a new variant of self-propagating malware being actively spread via USB drives by an Advanced Persistent Threat (APT) operation dubbed "Camaro Dragon," which they believe is backed by China. Check Point Research found multiple new variants of the malware while investigating a cybersecurity incident at a European healthcare facility. Researchers recently published a report highlighting the alarming role USB drives play in the spread of malware. According to the researchers, the healthcare facility was infected when a staff member attending a conference in Asia shared their USB drive with a colleague whose computer was infected, and the malware was transferred to the drive. When the employee returned to his home hospital in Europe, he introduced the infected USB drive to the hospital's computer systems, causing the infection to spread. Camaro Dragon, an espionage-focused group also known as Mustang Panda and LuminousMoth, has historically targeted Southeast Asian countries. It has been linked to previous campaigns in which infected USB drives were used to spread malware. This article continues to discuss the new variant of self-propagating malware actively being spread via USB drives in a Camaro Dragon campaign. 

SC Magazine reports "Malicious USB Drives Part of New Self-Propagating Malware Campaign"

Submitted by Anonymous on