The malware, named USB Switchblade, targets Windows systems and captures corporate information such as passwords, IP data, browser history and auto-fill records, including that used for online banking and other payment systems.
Moreover, security specialists claim the threat permits hackers into the system where they are able to set up "ghost admin" accounts and administer virtual network computing (VNC). This allows the criminals to change the configuration of the computer, set up privileges to obtain more data and gain remote access to other PCs on the network.
According to IT professionals, the malicious user downloads the malware off the internet and installs it onto a USB device. This then allows them to garner data from any unsecured endpoint on a computer in an office, call centre or bank.
The new threat works in the opposite way to USB Dumper, which security firms detected in October and stole files from the portable storage device.
"Organisations need to be vigilant as thieves develop more creative and ingenious ways to steal both personal and corporate data," said Andy Burton, CEO at Centennial Software.
"USB Switchblade is particularly clever as it is capable of not only stealing information such as user names and passwords, but can also set up a back door for thieves to enter the PC and selectively take data."
New endpoint malware detected by experts
By Fiona Raisbeck on Dec 15, 2006 9:03AM