• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Computer security Latest Cybersecurity News

Hackers send Teddy Bears and USB drives as gifts to deploy malware

William Marshal Posted On April 1, 2020
0



Hackers send Teddy bears and USB drives as gifts to deploy malware

F1N7 cybercriminal group are sending malicious USB drives and teddy bears through the United States Postal Service, deploying malware through booby-trapped USB drives. These USB devices can behave as a keyboard when connected to a computers, inject Powershell commands to execute a JavaScript, and deploy a malware called GRIFFON. The FBI had warned the businesses and front line actors to be aware of this threat in disguise.

The booby-trapped USB trick which security professionals and penetration testers have used are the fundamentals behind this attack structure. One such business had received a package from the USPS, and it had Best Buy Gift Card of $50 USD and a USB drive which is mentioned to have the list of products that can be purchased using that gift card. In recent times, USB drives are more than just a storage device, it can be used as a Human Interface Device (HID) which would convert them to keyboards, microphones or a mouse to deliver inputs automatically using a pre-programmed codes. This exactly has been used in this attack, please find the anatomy of this Teddy Bear USB drive attack below, 

Anatomy of this USB drive-by attacks

Security researchers from Trustwave studied this attack and found out that there is actually 3 unique Powershell commands that are being invoked and executed via these USB drives, leading to the installation of the malware in the computer that is connected to this USB drive. On investigating the USB drives further, the FBI had found the drives to be from Arduino Leonardo, using the micro controller ATMEGA24U and ATMEGA32U4, which is mostly costs below $14 USD.

Users can protect their computers in three different steps, keep an eye for malicious packages and teddy bears, the flag is red if you find a USB drive with or without, gift cards and never plug in the drives to the computers. While on the other hand, enterprises can employ USB security management applications to restrict devices that are unrecognized and keep their device control configurations updated. They can also updated the Powershell and turn ON the logging to identify the attack vectors.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

Share the article with your friends


F1N7 USB attackTeddy and gift box packages USB attackUSB drive-by attacks


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search