{"id":238237,"date":"2017-08-24T05:42:59","date_gmt":"2017-08-24T09:42:59","guid":{"rendered":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/windows-security-cryptocurrency-miner-malware-is-enslaving-pcs-zdnet.php"},"modified":"2017-08-24T05:42:59","modified_gmt":"2017-08-24T09:42:59","slug":"windows-security-cryptocurrency-miner-malware-is-enslaving-pcs-zdnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cryptocurrency-2\/windows-security-cryptocurrency-miner-malware-is-enslaving-pcs-zdnet.php","title":{"rendered":"Windows security: Cryptocurrency miner malware is enslaving PCs &#8230; &#8211; ZDNet"},"content":{"rendered":"<p><p>    Trend Micro says Coinminer's use of    fileless WMI scripts and EternalBlue makes its threat to    Windows machines \"extremely stealthy and persistent\".  <\/p>\n<p>    Criminals are infecting Windows machines with fileless malware    that runs in memory, and puts the hijacked PCs to work on    mining cryptocurrency.  <\/p>\n<p>    Two features in particular make this malware, known as    Coinminer, \"extremely stealthy and persistent\", according to    malware researchers at Trend Micro.  <\/p>\n<p>    To infect Windows machine, it's using the so-called EternalBlue    vulnerability employed by WannaCry and NotPetya as a spreading    mechanism. Microsoft released a patch for the flaw in March but    a spate of infections in Asia, mostly in Japan, suggest some    systems have not been updated.  <\/p>\n<p>    On machines vulnerable to this bug, the malware runs a backdoor    that installs several     Windows Management Instrumentation (WMI) scripts that run    in memory, which makes them more difficult to detect.  <\/p>\n<p>    IT admins can use WMI to run scripts that automate    administrative tasks on remote computers and acquire management    data from these computers and installed Windows applications.  <\/p>\n<p>    However, in this case the cryptocurrency mining malware uses    WMI for more nefarious purposes, including connecting to the    attacker's command-and-control domains to download the mining    software and malware.  <\/p>\n<p>    WMI malware isn't new and was used in the infamous Stuxnet    malware. FireEye has also     found an advanced hacker group APT29 using WMI capabilities    to create persistent and stealthy backdoors by automatically    triggering a backdoor when a system starts up.  <\/p>\n<p>    Malwarebytes identified WMI techniques being used to hijack Chrome and Firefox to redirect users    to an attack site.  <\/p>\n<p>    According to Trend Micro, the mining malware operation includes    a timer that automatically triggers the malicious WMI script    every three hours.  <\/p>\n<p>    Admins should disable the SMBv1 file-sharing protocol to    prevent attacks using Eternal Blue, an exploit for SMBv1    thought to be created by the NSA and leaked in April by the    Shadow Brokers.  <\/p>\n<p>    Even before the leak of EternalBlue and WannaCry's adoption of    it, Microsoft was     urging customers to stop using the 30-year-old protocol.  <\/p>\n<p>    Trend Micro also points to a Microsoft     tool that can trace WMI activity and recommends restricting    WMI on an as-needs basis, as well as disabling WMI on machines    that don't need access to it.  <\/p>\n<p>            Hackers      are making their malware more powerful by copying WannaCry      and Petya ransomware tricks    <\/p>\n<p>      The group behind Trickbot is attempting to give its Trojan      malware the self-spreading worm-like capabilities that have      made recent ransomware attacks go global.    <\/p>\n<p>            Leaked NSA hacking exploit used in WannaCry      ransomware is now powering Trojan malware    <\/p>\n<p>      EternalBlue Windows security flaw is being leveraged to make      Nitol and Gh0st RAT cyberespionage tools more effective, warn      researchers.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.zdnet.com\/article\/windows-security-cryptocurrency-miner-malware-is-enslaving-pcs-with-eternal-blue\/\" title=\"Windows security: Cryptocurrency miner malware is enslaving PCs ... - ZDNet\">Windows security: Cryptocurrency miner malware is enslaving PCs ... - ZDNet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Trend Micro says Coinminer's use of fileless WMI scripts and EternalBlue makes its threat to Windows machines \"extremely stealthy and persistent\". Criminals are infecting Windows machines with fileless malware that runs in memory, and puts the hijacked PCs to work on mining cryptocurrency <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/cryptocurrency-2\/windows-security-cryptocurrency-miner-malware-is-enslaving-pcs-zdnet.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261456],"tags":[],"class_list":["post-238237","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/238237"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=238237"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/238237\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=238237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=238237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=238237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}