The Federal Board of Revenue (FBR) in Islamabad recently thwarted a significant data breach attempt by promptly intercepting an infection targeting FBR computers via a USB device.
Reports indicate that the security breach originated from an infected USB drive utilized within the FBR House (Room 571). Fortunately, the malware’s propagation onto the PC was successfully blocked, thereby averting a potentially disastrous data breach or system compromise.
Following an investigation by FBR officials, it was uncovered that the USB drive had been taken by an end-user (FBR staff/officer) to a local print shop for file printing, inadvertently introducing the infection back into the FBR network. Consequently, it has been strongly advised to either restrict or regulate the use of USB drives on PCs within FBR offices nationwide, particularly between officers and for printing purposes. Additionally, plans are underway to implement an automated Data Loss Prevention (DLP) solution to enhance security measures, as suggested by FBR’s IT security officials.
A security circular released by FBR’s Chief Information Security Officer (CISO) reported the successful interception of high-severity malware on the USB device by the CrowdStrike agent, a cybersecurity product employed by the FBR. This proactive measure effectively prevented a potential data breach within the FBR system.
The use of USB devices poses significant and grave risks, including exposure to malware, unauthorized access, data leakage, and vulnerabilities arising from outdated software. To mitigate such security threats, it is strongly advised to refrain from using USB devices on official PCs within the FBR computer network.
These precautionary measures have been endorsed by the Member (IT) of the FBR, signaling a concerted effort to bolster cybersecurity protocols and safeguard sensitive data against potential breaches.