Earlier this year. The technical evidence shows the malware bears similarities to attacks from a Chinese espionage group dubbed Mustang Panda. Check Point traced the infection back to a USB drive belonging to an employee at the European hospital. The same USB drive was previously taken to a conference in Asia. The employee shared his presentation with fellow attendees using his USB drive. Unfortunately one of his colleagues had an infected computer so his own.USB drive unknowingly became infected assaid. After returning to Europe the employee then slotted the USB drive into a hospital computer thereby spreading the USA Telegram Number Data infection to another continent. Check Point suspects the European health institution was merely collateral damage and not the intended target. Thats because group behind the malware Mustang Panda has historically targeted countries based in Southeast Asia. Check Point points out the incident provides an inthewild sighting of hacking tools that antivirus provider Avast described last December.

Areport about Mustang Panda. At the time Avast had uncovered an FTP server the Chinese hacking group was using to host its hacking tools which included a launcher written in Delphi to install malware on a USB drive. image of the malware hiding USB files Credit Check Point The malware works by hiding all the files in the USB drive. When a user accesses the drive on a computer theyll instead see an executable program that bears the USB drives name alongside a folder named Kaspersky a reference to the antivirus company. The Kaspersky name may fool users into thinking their USB drive has undergone some.