Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Security warning after Abertay researchers find 75,000 files on seemingly empty USB drives

Professor Karen Renaud, from Abertay University's Division of Cybersecurity. Unknown. Supplied by Abertay University Date; 06/05/2019  Pic Alan Richardson Pix-AR.co.uk
Free to Use 
Prof Karren Renaud, Abertay University, Dundee.
Professor Karen Renaud, from Abertay University's Division of Cybersecurity. Unknown. Supplied by Abertay University Date; 06/05/2019 Pic Alan Richardson Pix-AR.co.uk Free to Use Prof Karren Renaud, Abertay University, Dundee.

Thousands of highly sensitive documents have been retrieved by Dundee cyber experts from seemingly empty USB drives.

Researchers from Abertay University said 75,000 files were recovered from 100 devices which had been sold second hand, using tools available to the public.

The cybersecurity team found tax returns, contracts and bank statements among the “deleted” files as part of an investigation into the risks of selling used USB drives over the internet.

Researchers purchased the USB drives on a popular online auction site and examined them further, when they found 98 out of 100 seemed, at face value, to be empty but only 32 of the drives had been properly wiped.

Professor Karen Renaud, from Abertay’s Division of Cybersecurity, said: “This is extremely concerning, and the potential for this information to be misused with extremely serious consequences is enormous.

“An unscrupulous buyer could feasibly use recovered files to access sellers’ accounts if the passwords are still valid, or even try the passwords on the person’s other accounts given that password re-use is so widespread.

“They would likely be able to find a seller’s e-mail address from the files we found on the drive. They could try to siphon money from the bank accounts or even blackmail a seller by threatening to reveal embarrassing information.”

Some of the USB files included images with embedded location data, while others contained passwords.

The research, led by Masters student James Conacher, found none of the drives held any viruses or other malware, meaning the risk lies with the seller, not the buyer.

Professor Renaud explained why people mistakenly believe they have cleared USBs.

“The file is removed from the index so that they are effectively hidden from view,” she said.

“They’re still there though and if you know how, you can easily recover them using publicly available forensics tools.

“Software is freely available that can permanently wipe USB drives, so if you are going to sell a device we would strongly recommend using that.

“If you’re planning to discard a USB device without selling it, you should destroy it with a hammer – make it impossible for a third party to get hold of the data it stores.”

“If you’re planning to buy a new USB drive, the best way of mitigating the risks is to buy an encrypted device.”