Data from Removable Media

From ATT&CK
Jump to: navigation, search
Data from Removable Media
Technique
ID T1025
Tactic Collection
Platform Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows XP, Windows 7, Windows 8, Windows Server 2003 R2, Windows Server 2008 R2, Windows Server 2012 R2, Windows Vista, Windows 8.1
System Requirements Privileges to access removable media drive and files
Data Sources File monitoring, Process monitoring, Process command-line parameters

Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration.

Adversaries may search connected removable media on computers they have compromised to find files of interest. Interactive command shells may be in use, and common functionality within cmd may be used to gather information. Some adversaries may also use Automated Collection on removable media.

Examples

  • FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on removable media and copies them to a staging area. The default file types copied would include data copied to the drive by SPACESHIP.1
  • CosmicDuke steals user files from removable media with file extensions and keywords that match a predefined list.2
  • Rover searches for files on attached removable drives based on a predefined list of file extensions every five seconds.3
  • Prikormka contains a module that collects documents with certain extensions from removable media or fixed drives connected via USB.4
  • Crimson contains a module to collect data from removable drives.5
  • Remsec has a package that collects documents from any inserted USB sticks.6
  • Once a removable media device is inserted back into the first victim, USBStealer collects data from it that was exfiltrated from a second victim.78

Mitigation

Identify unnecessary system utilities or potentially malicious software that may be used to collect data from removable media, and audit and/or block them by using whitelisting9 tools, like AppLocker,1011 or Software Restriction Policies12 where appropriate.13

Detection

Monitor processes and command-line arguments for actions that could be taken to collect files from a system's connected removable media. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.

References