
Agent.BTZ — how one USB stick rewrote modern cyber defence
Agent.BTZ, a USB worm that quietly infected thousands of machines across military networks and triggered Operation Buckshot Yankee. The incident exposed a brutal truth: air-gapped or “isolated” systems are only as safe as the human habits and peripherals that touch them. What happened (short): a soldier used a USB on a public terminal, the thumb drive carried a worm that exploited autorun behavior, once back inside classified networks (SIPRNet), the malware spread slowly but persistently, collecting data and beaconing out. Analysts at NSA and teams at Fort Meade mounted Operation Buckshot Yankee to contain and eradicate the infection. The US response led to scanning tools (Magic Eraser), temporary USB bans in theater, and ultimately helped catalyze organizational change toward coordinated cyber operations under U.S. Cyber Command and improved incident playbooks. Key later research linked Agent.BTZ to other advanced toolsets (e.g., activity attributed to Turla). Why it still matters • H
Continue reading on Dev.to
Opens in a new tab




