By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: booby-trapped USB sticks invade European ports
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > booby-trapped USB sticks invade European ports
Mobile

booby-trapped USB sticks invade European ports

News Room
Last updated: 2025/10/14 at 12:56 PM
News Room Published 14 October 2025
Share
SHARE

Several years after its discovery, the cyberespionage campaign led by the Chinese hacker group Mustang Panda continues to worry the entire world. The hackers’ modus operandi was well-established: distributing corrupted USB keys, camouflaged in free goodies, with an apparently harmless appearance. At the time, our colleagues from Clubic was interested in the matter, more sensitive than it seems. Two years later, at the Cybersecurity Conference, the media drew up a complicated assessment of the affair: not only is the operation still active, but it has now invaded maritime cargo ships and reached Europe.

Free USB sticks as bait

The corrupted keys were likely distributed under the cover of a fake company, setting up fictitious stands at maritime trade shows. An infiltration which made it possible to gain the trust of potential victims, without anyone being suspicious. But the tactic is not limited to BtoB events: hackers also got into the habit of leaving USB keys in restaurants, parking lots and hotels, amplifying the spread and the risk of infection. A mode of operation formidable, and visibly effective: cargo ships are often disconnected from the Internet. When they connect to the satellite network, the malware has had plenty of time to act offline before being spotted.

Especially since it quickly becomes complicated to determine when the infected keys were actually used. Distributed massively, some could have been used months after reaching the pockets of their victims. To scramble the reading of attack strings, and prolong the persistence of infections. Two years after the affair, attacks are still taking place, despite detection and blocking efforts.

Some reflexes to adopt

When it comes to cybersecurity, vigilance is not enough. You also need to adopt good reflexes. A USB key, behind its innocuous appearance, can be a formidable Trojan horse for your data. Assume that you should never plug in a USB key whose origin you do not know. Whether they are small independent groups or more established political entities, the most formidable attacks are often the simplest.

🟣 To not miss any news on the WorldOfSoftware, subscribe on Google News and on our WhatsApp. And if you love us, .

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article ‘Sovereign AI’ Has Become a New Front in the US-China Tech War
Next Article In reality, the workslop is sinking her
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Netflix Users Are Obsessed With A 13 Reasons Why Star’s Military Drama Series – BGR
News
Apple’s MacBook Pro M5 teaser leaves little to the imagination | Stuff
Gadget
Hit otome game Love and Deepspace achieves nearly seven million active users in its first month · TechNode
Computing
Altman says ChatGPT will soon allow erotica for adult users
News

You Might also Like

Mobile

Barcelona brings together CIOs and technology managers in the IV edition of the LiceoTIC Congress

3 Min Read
Mobile

In reality, the workslop is sinking her

6 Min Read
Mobile

“The competitive key is in business planning”

8 Min Read
Mobile

Gemini Nano Banana AI Image Editor Rolls Out To Google Search And NotebookLM: Here’s What’s New

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?