{"id":193200,"date":"2017-05-17T01:31:06","date_gmt":"2017-05-17T05:31:06","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/massive-cryptocurrency-botnet-used-leaked-nsa-exploits-weeks\/"},"modified":"2017-05-17T01:31:06","modified_gmt":"2017-05-17T05:31:06","slug":"massive-cryptocurrency-botnet-used-leaked-nsa-exploits-weeks","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/massive-cryptocurrency-botnet-used-leaked-nsa-exploits-weeks\/","title":{"rendered":"Massive cryptocurrency botnet used leaked NSA exploits weeks &#8230;"},"content":{"rendered":"<p><p>    On Friday, ransomware called WannaCry used     leaked hacking tools stolen from the National Security Agency    to attack an estimated 200,000 computers in 150 countries.    On Monday, researchers said the same weapons-grade attack kit    was used in a much-earlier and possibly larger-scale hack that    made infected computers part of a botnet that mined    cryptocurrency.  <\/p>\n<p>    Like WannaCry, this earlier, previously unknown attack used an    exploit codenamed EternalBlue and a backdoor called    DoublePulsar, both of which were     NSA-developed hacking tools leaked in mid April by a group    calling itself Shadow Brokers. But instead of installing    ransomware, the campaign pushed cryptocurrency mining software    known as Adylkuzz. WannaCry, which gets its name from a    password hard-coded into the exploit, is also known as WCry.  <\/p>\n<p>    Kafeine, a well-known researcher at security firm Proofpoint,    said the attack started no later than May 2 and may have begun    as early as April 24. He said the campaign was surprisingly    effective at compromising Internet-connected computers that    have yet to install updates Microsoft released in early March    to patch the critical vulnerabilities in the Windows    implementation of the Server Message Block protocol. In a        blog post published Monday afternoon, Kafeine wrote:  <\/p>\n<p>      In the course of researching the WannaCry campaign, we      exposed a lab machine vulnerable to the EternalBlue attack.      While we expected to see WannaCry, the lab machine was      actually infected with an unexpected and less noisy guest:      the cryptocurrency miner Adylkuzz. We repeated the operation      several times with the same result: within 20 minutes of      exposing a vulnerable machine to the open web, it was      enrolled in an Adylkuzz mining botnet.    <\/p>\n<p>      The attack is launched from several virtual private servers      which are massively scanning the Internet on TCP port 445 for      potential targets.    <\/p>\n<p>      Upon successful exploitation via EternalBlue, machines are      infected with DoublePulsar. The DoublePulsar backdoor then      downloads and runs Adylkuzz from another host. Once running,      Adylkuzz will first stop any potential instances of itself      already running and block SMB communication to avoid further      infection. It then determines the public IP address of the      victim and download[s] the mining instructions, cryptominer,      and cleanup tools.    <\/p>\n<p>      It appears that at any given time there are multiple Adylkuzz      command and control (C&C) servers hosting the cryptominer      binaries and mining instructions.    <\/p>\n<p>      Figure 2 shows the post-infection traffic generated by      Adylkuzz in this attack.    <\/p>\n<p>    Symptoms of the attack include a loss of access to networked    resources and system sluggishness. Kafeine said that some    people who thought their systems were infected in the WannaCry    outbreak were in fact hit by the Adylkuzz attack. The    researcher went on to say this overlooked attack may have    limited the spread of WannaCry by shutting down SMB networking    to prevent the compromised machines from falling into the hands    of competing botnets.  <\/p>\n<p>    Proofpoint researchers have identified more than 20 hosts set    up to scan the Internet and infect vulnerable machines they    find. The researchers are aware of more than a dozen active    Adylkuzz control servers. The botnet then mined Monero, a    cryptocurrency that bills itself as being fully anonymous, as    opposed to Bitcoin, in which all transactions are traceable.  <\/p>\n<p>    Monday's report came the same day that a security researcher    who works for Google found     digital fingerprints tying a version of WCry from February to    Lazarus Group, a hacking operation with links to North    Korea. In a     report published last month, Kaspersky Lab researchers said    Bluenoroff, a Lazarus Group offshoot responsible for financial    profit, installed cryptocurrency-mining software on computers    it hacked to generate Monero coins. \"The software so intensely    consumed system resources that the system became unresponsive    and froze,\" Kaspersky Lab researchers wrote.  <\/p>\n<p>    Assembling a botnet the size of the one that managed WannaCry    and keeping it under wraps for two to three weeks is a major    coup. Monday's revelation raises the possibility that other    botnets have been built on the shoulders of the NSA but have    yet to be identified.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2017\/05\/massive-cryptocurrency-botnet-used-leaked-nsa-exploits-weeks-before-wcry\/\" title=\"Massive cryptocurrency botnet used leaked NSA exploits weeks ...\">Massive cryptocurrency botnet used leaked NSA exploits weeks ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> On Friday, ransomware called WannaCry used leaked hacking tools stolen from the National Security Agency to attack an estimated 200,000 computers in 150 countries. On Monday, researchers said the same weapons-grade attack kit was used in a much-earlier and possibly larger-scale hack that made infected computers part of a botnet that mined cryptocurrency. Like WannaCry, this earlier, previously unknown attack used an exploit codenamed EternalBlue and a backdoor called DoublePulsar, both of which were NSA-developed hacking tools leaked in mid April by a group calling itself Shadow Brokers <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/massive-cryptocurrency-botnet-used-leaked-nsa-exploits-weeks\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-193200","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193200"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193200"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193200\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}