E-cigarettes spreading malware via PC USB ports

Electronic cigarettes may be better for your lungs, but they're not so great for your laptop

E-cigarettes imported from China are spreading malware to computers when connected to them via USB ports. 

According to a user on Reddit, malware infected the PC after an e-cigarette was plugged into its USB port to charge up.

"The made in China e-cigarette had malware hardcoded into the charger, and when plugged into a computer's USB port the malware phoned home and infected the system," said Jrockilla.

This came to light when an executive at the company where the Reddit user worked had a PC with malware discovered on it.

Advertisement
Advertisement - Article continues below

"The executive's system was patched up to date, had antivirus and anti-malware protection," said Jrockilla. "Web logs were scoured and all attempts made to identify the source of the infection but to no avail.

"Finally after all traditional means of infection were covered, IT started looking into other possibilities. They finally asked the executive: 'Have there been any changes in your life recently?' The executive said: 'Well yes, I quit smoking two weeks ago and switched to e-cigarettes.' And that was the answer they were looking for."

Stuart Morgan, senior security consultant with MWR InfoSecurity, said users should always be wary of connecting any USB device to a computer.

"Even if you believe that it is just to charge it, could [it] allow or facilitate compromise (because computer USB ports are not power-only ports)," he said.

Devices can look innocent, but other items that can be charged through USB ports include: torches, portable power packs, hands free mobile phone kits, cup warmers, satnavs and some wireless headphones.

"It is important that everyone realises that this attack vector is not specific to e-cigarettes; any device that is connected to a computer could contain a malicious payload," said Morgan. "People may get fixated on electronic cigarettes but forget the multitude of other devices which could present the same level of risk."

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

8 Mar 2019

Most Popular

Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/public-cloud/34850/salesforce-takes-aws-relationship-to-the-next-level
News

Salesforce takes AWS relationship to the next level

19 Nov 2019
Visit/security/ransomware/354171/microsoft-issues-statement-debunking-teams-ransomware-rumours
ransomware

Microsoft issues statement debunking Teams ransomware rumours

21 Nov 2019
Visit/mobile/5g/354161/tests-show-uks-5g-network-is-450-faster-than-4g
5G

Tests show UK's 5G network is 450% faster than 4G

20 Nov 2019