Table of Contents

LUCY allows you to create files that can be stored on removable media devices (CD, USB, DVD, SD Card, etc.). The most popular is an attack using USB sticks. But keep in mind that this template works for all other variations of removable media types as well.

Background Info about Portable Media Attacks

At the moment, there are three popular methods that malicious applications use to infect USB flash drives:

Simple file copy method: With this method, a malicious application that is installed on an infected computer simply makes copies of itself to all storage devices that are attached to the infected computer. With this method, a malicious file is often named with a sensational filename to lure a victim into launching the file and causing malicious code to be executed. Quite often there are familiar file icons such as Microsoft Windows icons for videos and images that are used to trick unsuspecting victims into thinking that an executable file is a harmless image or video. This infection method requires that the victim manually execute the malicious file from their computer to become infected.

AutoRun.inf modification method: Microsoft Windows and some other operating systems have a functionality that is called “AutoRun” (sometimes also referred to as Autoplay). AutoRun functionality is basically designed to perform some actions that are automatically executed when removable media is inserted or removed from a computer. On Microsoft Windows platforms, “autorun.inf” is the file that contains instructions for the AutoRun functionality. The autorun.inf file can instruct AutoRun to use a certain type of icon; add menu commands; and among other things, start an executable. With this infection method, the malicious application modifies or creates an autorun.inf file on all of the network shares, local drives, and removable media (including USB flash drives) that are connected to the computer. When an infected USB flash drive is inserted into another computer, the copy of the malicious application is automatically executed. Under a default configuration of Windows, this infection method does not require any interaction from the victim other than physically attaching the media to the computer.

Reprogramming USB peripherals. To turn one device type into another, USB controller chips in peripherals need to be reprogrammed. Very widely spread USB controller chips, including those in thumb drives, have no protection from such reprogramming.

BadUSB – Turning devices evil: Once reprogrammed, benign devices can turn malicious in many ways, including:

Our Portable Media Attack Approach

With LUCY we provide a template for the "Simple file copy method". As mentioned before this infection method requires that the victim manually execute the malicious file from their computer to become infected. So you have to lure a victim into launching the file and causing malicious code to be executed (e.g. just copy the file with an interesting file name on a USB stick and place them in spots where they will be picked up by other users).

Setup

In order to create a Portable Media Attack scenario go through the following steps:

STEP 1 - Create a New Campaign: After the login, you can create your first Phishing Campaign by pressing the button “New Campaign”. Then choose the Attack Simulation campaign type.

STEP 2 - Choose Attack Type: In order to configure the campaign choose Portable Media Attacks.

STEP 3 - Select or Create a Client: Create a client or choose the built-in client (a client can be your own organization or the company that asked you to perform a phishing test). This is important because you can also create view only accounts that are associated with those clients.

STEP 4 - Select your Attack Template: Select the scenario called Portable Media Attack. If you don't have this scenario among your templates then please download it using the "download" button in the SettingsTemplatesDownload Templates.

STEP 5 - Give the scenario a name and pick a domain or IP address: This is the domain or IP which is used upon execution: the malware simulation will send the data back to this host.

STEP 6 - Configure the File template: This template defines what malware simulation should be running upon execution of the file on the Portable Media Device. Make sure you have the latest malware simulations installed in LUCY. You can download the malware simulations using the "download" button in the template section.

STEP 7 - Configure Number of Portable Media Devices: Choose the option Enter Manually and add a Number of Portable Media Devices to define how many USB sticks you plane to use.

STEP 8 - Download Files: You're all set! Hit Start if you would like to start the campaign right away. You will be able to start the campaign any time later from the campaign summary page.

Once you started the campaign LUCY will wait for incoming requests from executed files.

What are the requirements for an USB stick to report back to LUCY?

In order to for the USB stick to report back to LUCY the following requirements must be met:

*You could also purchase USB sticks that will emulate external hardware (like keyboard) and execute the file automatically when attached to a computer (https://shop.hak5.org/products/usb-rubber-ducky-deluxe)

Important Questions

Create an Attack with CD & DVD's

LUCY > 3.1 offers the administrator to create also ISO images which can be used to burn a CD or DVD. Most CD-ROM burning applications recognize this type of image file. Once the ISO file is burned as an image, then the new CD/DVD is a clone of the original and bootable.

To create an attack with ISO image you first need to create them according to a group within the recipient (make sure you enable the checkbox "portable media attack"):

Next, after you selected a template like the Portable Media Attack scenario, you need to make sure that within the scenario settings you enable the checkbox "generate ISO images":

After configuring the remaining scenario settings you can add the recipient group which you created for the portable media attack to your scenario. You should see a screen similar to the following example:

Once you started the campaign LUCY will wait for incoming requests from executed files.

Here is also a quick tutorial on how to burn a bootable ISO image on different operating systems:

Windows 8/8.1/10

Windows 7/Vista

MacOS

Protect your Network from USB attacks with a challenge campaign

Unknown USB devices are a serious risk to your network. 67% of employees who find a USB device in a parking lot will plug it into their computer.

Would your employees put your network at risk and plug in an unknown USB device?

Find out in 3 simple steps:

START THE USB CHALLENGE AND GET A QUOTE