Contaminated pendrives, pay attention!

January 15, 2022

This 2022 represents a new opportunity for cybercriminals to redirect their nefarious strategies to harm all users and companies. Now, in recent days it has been mentioned that several US companies receive pendrives with malware from a group that was posing as the Department of Health and Human Services and Amazon.

Let’s look at the modus operandi of this strategy

  1. Companies such as transport or insurance companies are some of the target companies that have received them.
  2. Later, once they are inserted into the computer, the malware inside them would start running to:
  • Access company networks
  • Deploy a ransomware
  • Hijack the data
  • Ask for a ransom

     3. Additionally, hackers ensured to include information about the coronavirus or gift cards inside them.

The suspects

The F.B.I., which has mentioned not containing reliable evidence of its suspicions, puts its finger on the FIN7 group. Which brings us to the question: What is the FIN7 group?

  • A group with a very high success rate and active for a long time.
  • It has caused billions of losses to companies in the US and abroad.
  • It stands out for its wide spectrum of cyberattacks.
  • The F.B.I. has been persecuting its members for a long time.


The F.B.I. has already issued a series of communications to companies on taking special care with pendrives received. Also, it has requested to handle it with extreme care to search for fingerprints or DNA to carry out tests and find those responsible.

The investigation is currently in progress.

After seeing the cases commented on in this text, will you wait to fall on this type of mistake and be affected like your company? So, we suggest you request information from our digital forensic and cybersecurity services. Contact us: We want you to be safe and your company too!


  1. Jiménez, J. (2022). ¡Cuidado con estos pendrives! Tienen virus. Retrieved from:
  2. Sánchez, C. (2022). Varias empresas de EE.UU. reciben pendrives con malware. Retrieved from:

Authored by
Jorge Daniel Tejeda