LUCY allows you to create file that can be stored on removable media devices (CD, USB, DVD, SD Card etc.). The most popular is an attack using USB sticks. But keep in mind that this template works for all other variations of removable media types as well.
At the moment, there are three popular methods that malicious applications use to infect USB flash drives:
Simple file copy method: With this method, a malicious application that is installed on an infected computer simply makes copies of itself to all storage devices that are attached to the infected computer. With this method, a malicious file is often named with a sensational filename to lure a victim into launching the file and causing malicious code to be executed. Quite often there are familiar file icons such as Microsoft Windows icons for videos and images that are used to trick unsuspecting victims into thinking that an executable file is a harmless image or video. This infection method requires that the victim manually execute the malicious file from their computer to become infected.
AutoRun.inf modification method: Microsoft Windows and some other operating systems have a functionality that is called “AutoRun” (sometimes also referred to as Autoplay). AutoRun functionality is basically designed to perform some actions that are automatically executed when removable media is inserted or removed from a computer. On Microsoft Windows platforms, “autorun.inf” is the file that contains instructions for the AutoRun functionality. The autorun.inf file can instruct AutoRun to use a certain type of icon; add menu commands; and among other things, start an executable. With this infection method, the malicious application modifies or creates an autorun.inf file on all of the network shares, local drives, and removable media (including USB flash drives) that are connected to the computer. When an infected USB flash drive is inserted into another computer, the copy of the malicious application is automatically executed. Under a default configuration of Windows, this infection method does not require any interaction from the victim other than physically attaching the media to the computer.
Reprogramming USB peripherals. To turn one device type into another, USB controller chips in peripherals need to be reprogrammed. Very widely spread USB controller chips, including those in thumb drives, have no protection from such reprogramming.
BadUSB – Turning devices evil: Once reprogrammed, benign devices can turn malicious in many ways, including:
With LUCY we provide a template for the “Simple file copy method”. As mentioned before this infection method requires that the victim manually execute the malicious file from their computer to become infected. So you have to lure a victim into launching the file and causing malicious code to be executed (e.g. just copy the file with an interesting file name on an USB stick and place them in spots where they will be picked up by other users).
In order to create an USB scenario go through the following steps:
In order to for the USB stick to report back to LUCY the following requirements must be met:
a) The file (exe) on the stick needs to be executed* b) The computer where the file on the USB stick gets executed needs access to the internet c) LUCY must be reachable from the internet (with the IP or domain name configured in the USB campaign) d) The campaign must be running
*You could also purchase USB sticks that will emulate an external hardware (like keyboard) and execute the file automatically when attached to a computer (http://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe)