{"id":193198,"date":"2017-05-17T01:31:03","date_gmt":"2017-05-17T05:31:03","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-miner-adylkuzz-attack-could-be-bigger-than-wannacry-sc-magazine\/"},"modified":"2017-05-17T01:31:03","modified_gmt":"2017-05-17T05:31:03","slug":"cryptocurrency-miner-adylkuzz-attack-could-be-bigger-than-wannacry-sc-magazine","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/cryptocurrency-miner-adylkuzz-attack-could-be-bigger-than-wannacry-sc-magazine\/","title":{"rendered":"Cryptocurrency miner Adylkuzz attack could be bigger than WannaCry &#8211; SC Magazine"},"content":{"rendered":"<p><p>Cryptocurrency  <\/p>\n<p>    The attackers behind WanaCrypt0r\/WannaCry    were not the only cybercriminals putting DoublePulsar and    EternalBlue to use this weekend, as Proofpoint spotted the    stolen NSA tools being used with the cryptocurrency miner    Adylkuzz.  <\/p>\n<p>    The Adylkuzz attack may not only have been larger than    WannaCry, but could have been one of the mitigating factors    that helped shut down that ransomware attack, wrote a    Proofpoint security researcher who goes by the alias     Kafeine. The mining campaign was after the cryptocurrency    Monero.  <\/p>\n<p>    Initial statistics suggest that this attack may be larger in    scale than WannaCry, affecting hundreds of thousands of PCs and    servers worldwide: because this attack shuts down SMB    networking to prevent further infections with other malware    (including the WannaCry worm) via that same vulnerability, it    may have in fact limited the spread of last week's WannaCry    infection, he said.  <\/p>\n<p>    The Adylkuzz campaign began sometime between April 24 and May    2. Because it started before WanaCryptor hit on May 12, Kafeine    thinks some companies mistakenly believed they were being    victimized by the ransomware when in fact it was Adylkuzz.  <\/p>\n<p>    Some of the clues that a system is under attack by this malware    include loss of access to shared Windows resources and slower    PC and server performance. Like WannaCry, Adylkuzz takes    advantage of Windows vulnerability MS17-010 on TCP port 445,    Kafeine reported. The attack itself originates from several    private servers that are scanning on port 445 for victims.  <\/p>\n<p>    Once EternalBlue finds a target computer it installs the    DoublePulsar backdoor which then injects Adylkuzz.  <\/p>\n<p>    Proofpoint came across this attack when it was searching for    WannaCry by setting up a computer vulnerable to EternalBlue.  <\/p>\n<p>    While we expected to see WannaCry, the lab machine was    actually infected with an unexpected and less noisy guest: the    cryptocurrency miner Adylkuzz. We repeated the operation    several times with the same result: within 20 minutes of    exposing a vulnerable machine to the open web, it was enrolled    in an Adylkuzz mining botnet, he wrote.  <\/p>\n<p>    Proofpoint was able to find several web addresses that received    Monero deposits starting on April 24. About $43,000 in Monero    was tracked being deposited.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.scmagazine.com\/cryptocurrency-miner-adylkuzz-attack-could-be-bigger-than-wannacry\/article\/662128\/\" title=\"Cryptocurrency miner Adylkuzz attack could be bigger than WannaCry - SC Magazine\">Cryptocurrency miner Adylkuzz attack could be bigger than WannaCry - SC Magazine<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cryptocurrency The attackers behind WanaCrypt0r\/WannaCry were not the only cybercriminals putting DoublePulsar and EternalBlue to use this weekend, as Proofpoint spotted the stolen NSA tools being used with the cryptocurrency miner Adylkuzz. The Adylkuzz attack may not only have been larger than WannaCry, but could have been one of the mitigating factors that helped shut down that ransomware attack, wrote a Proofpoint security researcher who goes by the alias Kafeine. The mining campaign was after the cryptocurrency Monero <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/cryptocurrency-miner-adylkuzz-attack-could-be-bigger-than-wannacry-sc-magazine\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-193198","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193198"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193198"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193198\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}