Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

A serious Tor browser flaw leaks users' real IP addresses

The so-called TorMoil flaw stems from a bug in how Firefox handles local file-based addresses.

A serious Tor browser flaw leaks users' real IP addresses

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Cryptocurrency Mining Malware Spreading for Weeks via Same Backdoor as WannaCry  (Read 27 times)

0 Members and 1 Guest are viewing this topic.

GilbertTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Arctic
  • Posts: 31619
Cryptocurrency Mining Malware Spreading for Weeks via Same Backdoor as WannaCry
16 May 2017, 10:30 am

The same attack kit used in the WannaCry global spread was also used in another attack last month that may have been even larger in size. 

According to Proofpoint's security researcher Kafeine, the attack used the same exploit codenamed EternalBlue, as well as a backdoor called DoublePulsar, both of which were included in those NSA files dumped by Shadow Brokers. Instead of installing ransomware, the campaign was pushing cryptocurrency mining software known as Adylkuzz WannaCry. 

By their estimates, the attack started sometime between April 24 and May 2. Much like the WannaCry ransomware, the campaign was quite efficient at compromising computers that have yet to install the Microsoft updates released back in March to patch the vulnerabilities. 

"In the course of researching the WannaCry campaign, we exposed a lab ... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle