Public Computers and Malware

· Read in about 5 min · (1008 Words)

Public Computers & Malware | Quttera blog

Public Computers, Malware, and I Never Thought I Would Find Malware There!

Name seven places where you might find public computers. Let me see if I can guess what you came up with. Hotels, libraries, airports, coffee shops, job search assistance locations, schools, and conference facilities. Let me add one more; the microphone.

Let's begin with the realization that some public computers are open to all or mostly all of the public, but even those that have restrictions on who can use them are still public computers. Hotel computers are typically only available for hotel guests to use. Computers in libraries are normally accessible to anyone. Public computers at airports are generally found after airport security which limits the access the public has to them. Typically the public computers at airports are only found in the executive lounges, which places further restrictions on the number of people who can access them. Job search assistance computers may be available to everyone or only to people who are using the company's services. School computers may be available for teachers to use, students in the classroom to use, and in some cases in classrooms where the general public can take computer courses. Usually, computers in conference centers are not likely to be any more dangerous than public computers in other settings but at some conferences the danger is a certainty. The risk at the Black Hat conference is such that IT departments mandate that employees are forbidden to use the conference computers and are encouraged to avoid the ATM machines in and near the hotels too.

And now we get to the microphone. At many conferences, the presenters use their own laptops, however at some conferences the presenters use a shared computer. Many years ago I was speaking at a security conference that had a shared computer. Before my presentation, the audio/video technician copied my presentation from my thumb drive to the presentation computer and then returned my thumb drive to me. After several months I finally pulled out my thumb drive and put it on my laptop. Instantly my antivirus software brought up a warning that the Mariposa virus had been detected. Although physical access to the presentation computer was restricted, data from multiple unknown private sources was being shared. in many ways this is no different than sharing a thumb drive with a friend or coworker, but I want you to be aware of the computers we might use that we might not think of as being public computers.

In a blog titled "What Comes to the Business Center Computer Stays on the Business Center Computer" I explained the data risks associated with business center computers. In the blog, I promised to address the malware threat in my blog here this week. The most well-known threat from malware on public computers is, of course, the keystroke logger. If you login to any account requiring a password while using a public computer there is always the threat that your credentials have been compromised. This is what keeps your corporate security team awake at night - worrying about employees logging into compromised computers. Keystroke loggers are not the only malicious software threat. As I explained in the example above, worms can spread through USB Devices. Macro viruses are also a threat, and we have seen a resurgence of them. If you create a document on a computer that has been infected with a macro virus your new document may be infected before you of type a single word. If you email the document or just copy it to your thumb drive to share later, you will be spreading malware.

There is some good news. Hotels have begun providing more secure public computers for their guest's use. Kiosk interfaces restrict users to a small set of activities thereby reducing most malware and data compromise risks. Restricted user rights and application whitelisting prevent the installation of both unauthorized good as well as malicious applications. Some hotels require guests to login to a session. Even though no password is required, when the guest logs off, all of the data from the prior session is deleted. On some hotel computers, users can access the file system however they do not have administrator privileges and are restricted to writing to or copying from specific locations. All other locations are inaccessible, even for viewing.

I rarely use public computers other than those at hotels and occasionally airline lounges. However, I still recommend that you do not use public computers for anything that requires you to log in or to access or create sensitive data. Limit your use of these machines to browsing the web, playing solitaire, or watching cat videos and you should be safe.

At Quttera it isn't only your website we want to protect, we want to help you be more secure in every way you interact with the web.

Is your website flagged for malware, blocked by the search engines or disabled by the host?

We are always quick to respond to protect our customers from ransomware and other cyber threats. Our experts are here to clean up any malware from your sites and remove false-positives, blacklisting and different kinds of alerts by any security vendor and search engines. Just select appropriate ThreatSign! Anti-Malware plan and get back online.

For other issues and help: Quttera’s help-desk

ABOUT RANDY ABRAMS

Randy (Washington, US) is a Senior Security Analyst at Quttera. Randy Abrams has been involved with the antimalware industry since 1997 when he became responsible for ensuring that Microsoft did not release infected products. Randy designed and administered the processes used to prevent the release of the infected software. The fundamentals of these processes are still used by Microsoft. In 2005 Randy joined ESET as the Director of Technical Education where he was a popular blogger, podcaster, and speaker at numerous security conferences. In 2012 Randy joined NSS as a Research Director focusing on the analysis of endpoint protection testing. A unique perspective and articulate insights have made Randy a sought-after resource for media commentary.
© 2017 Quttera Ltd. All rights reserved.