{"id":6857,"date":"2016-10-03T08:51:33","date_gmt":"2016-10-02T21:51:33","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=6857"},"modified":"2016-10-03T08:51:33","modified_gmt":"2016-10-02T21:51:33","slug":"dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox","title":{"rendered":"Don&#8217;t plug it in! Malware-infected USB sticks in your Mailbox"},"content":{"rendered":"<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6871\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg\" alt=\"Infected USB drives are making the rounds\" width=\"649\" height=\"365\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg 970w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468-300x169.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468-768x432.jpg 768w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/a><\/p>\n<p><strong>It&#8217;s like the tale of Pandora&#8217;s box.<\/strong> Infected USB sticks are finding their way into people&#8217;s mailboxes\u2014and curiosity is making them look inside.<\/p>\n<p>The Australian Police Force is being flooded with phone calls from residents of the Melbourne suburb of Pakenham. Upon connecting the infected USB sticks to thier computers, they&#8217;ve been assailed with extremely harmful malware.<\/p>\n<p><!--more--><\/p>\n<h2>USBs Are Like Presents<\/h2>\n<p>Part of me understands why they did it, too. These days, USB sticks contain so much data that getting one can be like getting a Christmas present or a surprise gift. A single USB in the mailbox could be a friend delivering a TV series or some vital work documents. They can also be from companies offering free trials or special software offers.<\/p>\n<p>In this case, some of the\u00a0infected USB sticks\u00a0did just that. They masqueraded as fraudulent media streaming service offers to lower people&#8217;s defenses, playing on the basic human love of unwrapping and getting free things.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_6867\" aria-describedby=\"caption-attachment-6867\" style=\"width: 674px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/Best-min-USB-gift-for-HSBC-ICBC-bank-Bloomberg-television-Swiss-post-London-stock-exchange-Pet-hospital_0.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-6867\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/Best-min-USB-gift-for-HSBC-ICBC-bank-Bloomberg-television-Swiss-post-London-stock-exchange-Pet-hospital_0.jpg\" alt=\"Infected USB sticks pretending to be gifts\" width=\"684\" height=\"402\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/Best-min-USB-gift-for-HSBC-ICBC-bank-Bloomberg-television-Swiss-post-London-stock-exchange-Pet-hospital_0.jpg 662w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/Best-min-USB-gift-for-HSBC-ICBC-bank-Bloomberg-television-Swiss-post-London-stock-exchange-Pet-hospital_0-300x176.jpg 300w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/a><figcaption id=\"caption-attachment-6867\" class=\"wp-caption-text\"><em><strong>USB Gifts:<\/strong> The rise of USB giveaways may have lead to a new sort of scam.<\/em><\/figcaption><\/figure>\n<p>Of course, for those who understand the risk of malware and ransomware, the words &#8216;unmarked USB stick&#8217; can make your stomach knot. The more you learn about malware, the more you realise how far criminals will go to infect your computer. Making hundreds of infected USB sticks to drop in mailboxes is not beyond the realm of possibility, and of course, that&#8217;s exactly what has happened.<\/p>\n<h2>Nearly Half of People Would Open\u00a0Infected USB Sticks<\/h2>\n<p>There&#8217;s that old saying that common sense isn&#8217;t common, and when it comes to IT security, it&#8217;s even less so. <a href=\"https:\/\/zakird.com\/papers\/usb.pdf\">A study<\/a> conducted by researchers from the University of Illinois, the University of Michigan, and Google revealed nearly half of people wouldn&#8217;t just plug in a USB stick they found on the ground into their PCs, they&#8217;d open files and click on unfamiliar links.<\/p>\n<figure id=\"attachment_6866\" aria-describedby=\"caption-attachment-6866\" style=\"width: 770px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/usb-image-courtesy-of-shutterstock.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6866\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/usb-image-courtesy-of-shutterstock.jpg\" alt=\"Over half of people would open infected USB sticks\" width=\"780\" height=\"408\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/usb-image-courtesy-of-shutterstock.jpg 780w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/usb-image-courtesy-of-shutterstock-300x157.jpg 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/usb-image-courtesy-of-shutterstock-768x402.jpg 768w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/a><figcaption id=\"caption-attachment-6866\" class=\"wp-caption-text\"><em><strong>Curiosity Killed the Comp:<\/strong> In one study, 297 USB drives were dropped in locations ranging from parking lots to library. Up to 45 percent of them were inserted into a computer and rifled through.<\/em><\/figcaption><\/figure>\n<p>Feel that stomach knotting now? I know I am. And up to half of people includes employees of your business. Upon being delivered a strange USB to your office, there&#8217;s almost a 50\/50 chance whoever receives it would just plug it in and start clicking on links.<\/p>\n<h2>Infected USB Sticks\u00a0Take Down Governments<\/h2>\n<p>The funny thing is, even though infected USB sticks have been around for ages, everyone falls for it; even governments. In 2010 (Six years now!) Iran&#8217;s nuclear facility was utterly demolished by the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\">Stuxnet sabotage malware<\/a>, delivered via USB stick. It destroyed their uranium enrichment centrifuges and put them out of operation.<\/p>\n<p>And the trick still works. Last month, a Hong Kong-based company started selling a USB stick called <a href=\"http:\/\/home.bt.com\/tech-gadgets\/tech-news\/this-usb-stick-can-kill-a-pc-in-seconds-11364010570576\">USB Kill v2 <\/a>that fries any computer it&#8217;s plugged into. Even air-gapped computers\u2014machines physically removed from networks for data safety\u2014can be undermined by infected USB sticks.<\/p>\n<figure id=\"attachment_6865\" aria-describedby=\"caption-attachment-6865\" style=\"width: 638px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/this-usb-stick-can-kill-a-pc-in-seconds-136401057063903901-151014114800.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6865\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/this-usb-stick-can-kill-a-pc-in-seconds-136401057063903901-151014114800.jpg\" alt=\"infected USB sticks aren't the only threat\" width=\"648\" height=\"365\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/this-usb-stick-can-kill-a-pc-in-seconds-136401057063903901-151014114800.jpg 648w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/this-usb-stick-can-kill-a-pc-in-seconds-136401057063903901-151014114800-300x169.jpg 300w\" sizes=\"auto, (max-width: 648px) 100vw, 648px\" \/><\/a><figcaption id=\"caption-attachment-6865\" class=\"wp-caption-text\"><em><strong>Insta-Kill:<\/strong> This unassuming USB stick can kill any machine seconds after being plugged in.<\/em><\/figcaption><\/figure>\n<h2>Idiot-Proofing Your Machines and Servers<\/h2>\n<p>Let&#8217;s face it; training your colleagues, staff, or anyone in best IT security practices is always an uphill battle. You never know if the protocol is going to stick in their heads, or if they&#8217;re just going to ignore it and plug in infected USB sticks into the company computers anyway. You&#8217;ll only know for sure once they do it, and by then, it&#8217;s too late.<\/p>\n<p>Anti-virus is going to do very little to stop this sort of USB intrusion, and on top of that, they work on a signature-based recognition method that is always playing catch-up with hackers.<\/p>\n<p>Rather than rely on people not being obtuse or the anti-virus being on the ball, you&#8217;re better off proactively protecting your company&#8217;s data. Make regular backups of servers and workstations: three backups on two different media, and keep one off-site. This is called a<a href=\"https:\/\/www.backupassist.com\/blog\/news\/3-2-1-rule-of-backups-infographic\/\"> 3-2-1 backup strategy<\/a>.<\/p>\n<p>With this sort of strategy in place, even if employees\u00a0plug in\u00a0infected USB sticks with the worst sort of malware on them, a bare-metal recovery will return things to normal.<\/p>\n<p>We recommend using <a href=\"https:\/\/www.backupassist.com\/backupassist.html\">BackupAssist<\/a> to perform full and <a href=\"https:\/\/www.backupassist.com\/blog\/news\/what-is-an-incremental-backup\/\">incremental<\/a> backups of your data. You can <a href=\"https:\/\/www.backupassist.com\/BackupAssist\/download2.php\">download the free 30-day trial<\/a>\u00a0and start protecting your systems straight away.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s like the tale of Pandora&#8217;s box. Infected USB sticks are finding their way into people&#8217;s mailboxes\u2014and curiosity is making them look inside. The Australian Police Force is being flooded with phone calls from residents of the Melbourne suburb of Pakenham. Upon connecting the infected USB sticks to thier computers, they&#8217;ve been assailed with extremely &#8230; <a title=\"Don&#8217;t plug it in! Malware-infected USB sticks in your Mailbox\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\">Read more <span class=\"screen-reader-text\">Don&#8217;t plug it in! Malware-infected USB sticks in your Mailbox<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":6871,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23],"tags":[388,311,491],"class_list":["post-6857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interest","category-news","tag-malware","tag-ransomware","tag-usb-drives"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Don&#039;t plug it in! Malware-infected USB sticks in your Mailbox<\/title>\n<meta name=\"description\" content=\"It&#039;s like the tale of Pandora&#039;s box. Infected USB sticks are finding their way into people&#039;s mailboxes\u2014and curiosity is making them look inside. (Read more)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t plug it in! Malware-infected USB sticks in your Mailbox\" \/>\n<meta property=\"og:description\" content=\"Would you plug it in? Upon finding a strange USB stick in public, studies show up to half of people plug them and open the files inside.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-02T21:51:33+00:00\" \/>\n<meta name=\"author\" content=\"Adam Ipsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Ipsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\"},\"author\":{\"name\":\"Adam Ipsen\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\"},\"headline\":\"Don&#8217;t plug it in! Malware-infected USB sticks in your Mailbox\",\"datePublished\":\"2016-10-02T21:51:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\"},\"wordCount\":752,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg\",\"keywords\":[\"malware\",\"ransomware\",\"USB drives\"],\"articleSection\":[\"Interest\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\",\"url\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\",\"name\":\"Don't plug it in! Malware-infected USB sticks in your Mailbox\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg\",\"datePublished\":\"2016-10-02T21:51:33+00:00\",\"description\":\"It's like the tale of Pandora's box. Infected USB sticks are finding their way into people's mailboxes\u2014and curiosity is making them look inside. (Read more)\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg\",\"width\":970,\"height\":546},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don&#8217;t plug it in! Malware-infected USB sticks in your Mailbox\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\",\"name\":\"Adam Ipsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"caption\":\"Adam Ipsen\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don't plug it in! Malware-infected USB sticks in your Mailbox","description":"It's like the tale of Pandora's box. Infected USB sticks are finding their way into people's mailboxes\u2014and curiosity is making them look inside. (Read more)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox","og_locale":"en_US","og_type":"article","og_title":"Don't plug it in! Malware-infected USB sticks in your Mailbox","og_description":"Would you plug it in? Upon finding a strange USB stick in public, studies show up to half of people plug them and open the files inside.","og_url":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox","og_site_name":"Cyber Resilience Blog","article_published_time":"2016-10-02T21:51:33+00:00","author":"Adam Ipsen","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg","twitter_misc":{"Written by":"Adam Ipsen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox"},"author":{"name":"Adam Ipsen","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d"},"headline":"Don&#8217;t plug it in! Malware-infected USB sticks in your Mailbox","datePublished":"2016-10-02T21:51:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox"},"wordCount":752,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg","keywords":["malware","ransomware","USB drives"],"articleSection":["Interest","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox","url":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox","name":"Don't plug it in! Malware-infected USB sticks in your Mailbox","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg","datePublished":"2016-10-02T21:51:33+00:00","description":"It's like the tale of Pandora's box. Infected USB sticks are finding their way into people's mailboxes\u2014and curiosity is making them look inside. (Read more)","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/09\/shutterstock_116458468.jpg","width":970,"height":546},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/dont-plug-it-in-malware-infected-usb-sticks-in-your-mailbox#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Don&#8217;t plug it in! Malware-infected USB sticks in your Mailbox"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d","name":"Adam Ipsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","caption":"Adam Ipsen"},"url":"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=6857"}],"version-history":[{"count":0,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6857\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/6871"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=6857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=6857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=6857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}