Home Security Cryptocurrency miner attack used NSA exploits before WannaCry
Cryptocurrency miner attack used NSA exploits before WannaCry Featured

Attackers used the NSA exploits utilised by the WannaCry creators to create a tool for mining for the monero cryptocurrency well before last weekend's ransomware crisis, according to researchers from the Proofpoint cyber security company.

The NSA exploits in question were EternalBlue and DoublePulsar, with the former used to create the WannaCry malware and the latter used to actually generate the ransomware.

The WannaCry attacks appear to have tapered off after a British security researcher registered a domain listed in the malware code, inadvertently stopping its spread.

A Proofpoint researcher, who goes by the moniker Kafeine, says that well in advance of the WannaCry attack, another large-scale attack took place to install the cryptocurrency miner Adylkuzz.

News of this attack remained under the radar because Adylkuzz does its work quietly, acting to generate the monero cryptocurrency.

Kafeine wrote that the spread of Adylkuzz may have, in fact, reduced the number of WannaCry infections because it shut off SMB services once it had infected a vulnerable Windows machine.

"However, it should be noted that the Adylkuzz campaign significantly predates the WannaCry attack, beginning at least on 2 May and possibly as early as 24 April," Kafeine wrote.

"This attack is ongoing and, while less flashy than WannaCry, is nonetheless quite large and potentially quite disruptive."

He said the was launched from several virtual private servers which were conducting large-scale scan of the Internet looking for potential targets that had TCP port 445 open.

"Upon successful exploitation via EternalBlue, machines are infected with DoublePulsar. The DoublePulsar backdoor then downloads and runs Adylkuzz from another host," Kafeine wrote.

"Once running, Adylkuzz will first stop any potential instances of itself already running and block SMB communication to avoid further infection. It then determines the public IP address of the victim and downloads the mining instructions, cryptominer, and clean-up tools."

He said it appeared that at any given time there were multiple Adylkuzz command and control servers hosting the binaries of the cryptominer along with the mining instructions.

CDAO SYDNEY TURNS 5 IN 2019

With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect