从可移动介质获取数据是指攻击者通过已控制的系统读取连接在主机上的移动存储设备,收集敏感信息用于后续攻击活动。传统检测方法侧重于监控文件系统访问日志、分析进程命令行参数,以及检测可疑的外部设备连接事件。防御措施包括限制可移动介质使用权限、部署设备控制策略,以及监控自动化收集工具的行为特征。
现有匿迹技术的核心逻辑围绕设备信任模型突破与数据操作时空特征重塑展开:固件层攻击直接颠覆硬件设备的功能可信基,在物理层面实现数据过滤;合法工具滥用技术则利用系统组件的功能正当性,将恶意操作伪装成合规管理行为;延迟外传机制通过分离数据采集与传输阶段,规避实时监控系统的关联分析。这些技术的共性在于突破传统安全防护的层次化防御假设,通过硬件、系统、应用层的协同隐匿,使得单一维度的安全控制措施难以有效检测。攻击者特别注重操作节奏与目标环境运维特征的匹配,例如在系统维护窗口期执行高负载操作,或利用设备固件的合法更新周期植入恶意代码。
| 效应类型 | 是否存在 |
|---|---|
| 特征伪装 | ✅ |
| 行为透明 | ❌ |
| 数据遮蔽 | ✅ |
| 时空释痕 | ✅ |
攻击者通过精确复现系统管理工具的操作特征实现行为伪装。例如使用PowerShell脚本调用WMI接口获取介质信息时,严格遵循系统管理员的典型命令参数格式,使恶意进程在命令行审计中呈现为合法管理活动。固件层攻击则通过模拟标准设备的协议交互过程,在硬件识别层面维持正常特征。
在数据暂存和传输阶段采用分片加密机制,每个数据块使用独立密钥进行AES-256加密,并与系统文件交叉存储。加密密钥通过隐写术嵌入驱动程序或注册表项,使得即便发现存储内容也无法直接解密完整数据集。
延迟外传技术将数据窃取过程分解为长周期、多阶段的离散操作。攻击者利用系统维护周期或设备常规使用时段执行关键操作,使得单次行为强度低于检测阈值,同时通过跨设备、跨时区的数据聚合进一步稀释行为特征浓度。
| ID | Name | Description |
|---|---|---|
| S0622 | AppleSeed |
AppleSeed can find and collect data from removable media devices.[1][2] |
| G0007 | APT28 |
An APT28 backdoor may collect the entire contents of an inserted USB device.[3] |
| S0456 | Aria-body |
Aria-body has the ability to collect data from USB devices.[4] |
| S0128 | BADNEWS |
BADNEWS copies files with certain extensions from USB devices toa predefined directory.[5] |
| S0050 | CosmicDuke |
CosmicDuke steals user files from removable media with file extensions and keywords that match a predefined list.[6] |
| S0115 | Crimson |
Crimson contains a module to collect data from removable drives.[7][8] |
| S0538 | Crutch |
Crutch can monitor removable drives and exfiltrate files matching a given extension list.[9] |
| S0569 | Explosive |
Explosive can scan all .exe files located in the USB drive.[10] |
| S0036 | FLASHFLOOD |
FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on removable media and copies them to a staging area. The default file types copied would include data copied to the drive by SPACESHIP.[11] |
| S1044 | FunnyDream |
The FunnyDream FilePakMonitor component has the ability to collect files from removable devices.[12] |
| G0047 | Gamaredon Group |
A Gamaredon Group file stealer has the capability to steal data from newly connected logical volumes on a system, including USB drives.[13][14] |
| S0237 | GravityRAT |
GravityRAT steals files based on an extension list if a USB drive is connected to the system.[15] |
| S0260 | InvisiMole |
InvisiMole can collect jpeg files from connected MTP devices.[16] |
| S0409 | Machete |
Machete can find, encrypt, and upload files from fixed and removable drives.[17][18] |
| S1146 | MgBot |
MgBot includes modules capable of gathering information from USB thumb drives and CD-ROMs on the victim machine given a list of provided criteria.[19] |
| S0644 | ObliqueRAT |
ObliqueRAT has the ability to extract data from removable devices connected to the endpoint.[20] |
| S0113 | Prikormka |
Prikormka contains a module that collects documents with certain extensions from removable media or fixed drives connected via USB.[21] |
| S0458 | Ramsay |
Ramsay can collect data from removable media and stage it for exfiltration.[22] |
| S0125 | Remsec |
Remsec has a package that collects documents from any inserted USB sticks.[23] |
| S0090 | Rover |
Rover searches for files on attached removable drives based on a predefined list of file extensions every five seconds.[24] |
| S0467 | TajMahal |
TajMahal has the ability to steal written CD images and files of interest from previously connected removable drives when they become available again.[25] |
| G0010 | Turla |
Turla RPC backdoors can collect files from USB thumb drives.[26][27] |
| S0136 | USBStealer |
Once a removable media device is inserted back into the first victim, USBStealer collects data from it that was exfiltrated from a second victim.[28][29] |
| ID | Mitigation | Description |
|---|---|---|
| M1057 | Data Loss Prevention |
Data loss prevention can restrict access to sensitive data and detect sensitive data that is unencrypted. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0017 | Command | Command Execution |
Monitor executed commands and arguments for actions that could be taken to collect files from a system's connected removable media. For example, data may be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell. |
| DS0022 | File | File Access |
Monitor for unexpected/abnormal file accesses to removable media (optical disk drive, USB memory, etc.) connected to the compromised system. |