BKAV said that computers with no internet connection could be targets for hackers. The computers contain important data, and once stolen, will cause serious consequences.

Agencies and organizations set up computers containing important data within the local network and disrupt the internet connections of these computers to prevent risks from cyberattacks. However, this is not enough to protect data.

Ngo Minh Hieu, a security expert, said it is a mistake to believe that only internet-connected computers can become victims of cyberattacks and data theft.

In fact, hackers can attack computers with no internet connection, exploiting the principle that all electronic devices produce electronic waves to steal information. 

In many cases, hackers run attack campaigns with malware spread via USBs and CDs under the forms of gifts or sale promotion programs with the purpose of stealing information.

BKAV’s Nguyen Tien Dat on February 21 told VietNamNet that before Tet, BKAV’s malware monitoring and warning system recognized a sharp increase in the number of malware samples targeting computers without internet connections.

The stolen data include files with the suffixes .doc, .docx, .xls, .xlsx, .ppt, .pptx, and .pdf.

Currently, the number of malicious codes targeting computers without an internet connection appears to be decreasing, but have not entirely disappeared.

This is not the first time that malware has appeared in Vietnam. PlugX has been used in many other campaigns all over the globe.

In Vietnam, BKAV’s system discovered malware for the first time in late Jan 2020. Dat said this dangerous malware uses very sophisticated and difficult-to-discover methods.

Meanwhile, distributing malware within internal system by spreading via USB makes the malware spread rapidly.

BKAV’s experts said that malware steals information from computers without Internet connection by copying data into a folder forging the recycle bin in USB.

To spread malware to other computers, malware creates a fake shortcut with executable codes to trick users to click. When users insert USB into computers without Internet connection and click the shortcut, the malware will be activated and steal information and put it into the USB. 

When executed on the computers with Internet connection, the malware sends stolen data to the server. Besides, malware has the function of receiving and implementing commands from servers to steal other information such as names of computers and configuration.

Trong Dat