{"id":194135,"date":"2017-05-22T03:21:56","date_gmt":"2017-05-22T07:21:56","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/eternalrocks-network-worm-uses-7-nsa-hacking-tools-network-world-network-world\/"},"modified":"2017-05-22T03:21:56","modified_gmt":"2017-05-22T07:21:56","slug":"eternalrocks-network-worm-uses-7-nsa-hacking-tools-network-world-network-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/eternalrocks-network-worm-uses-7-nsa-hacking-tools-network-world-network-world\/","title":{"rendered":"EternalRocks network worm uses 7 NSA hacking tools | Network World &#8211; Network World"},"content":{"rendered":"<p><p>          By Ms. Smith, Network World | May 21,          2017 8:58 AM PT        <\/p>\n<p>        Ms. Smith (not her real name) is a freelance writer and        programmer with a special and somewhat personal interest in        IT privacy and security issues.      <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      While you wont be forgetting the WannaCry ransomware attack,      it is likely you will be hearing a lot more about the alleged      NSA-linked EternalBlue exploit and DoublePulsar backdoor as      it seems a wide range of bad guys have them in their      toyboxes. At least one person is leveraging seven      leaked NSA hacking tools for a new EternalRocks network worm.    <\/p>\n<p>      EternalBlue and DoublePulsar    <\/p>\n<p>      Malwarebytes believes WannaCry did not spread by a      malicious spam email campaign, but by an scanning operation      that searched for vulnerable public facing SMB ports, then      used EternalBlue to get on the network and DoublePulsar to      install the ransomware.    <\/p>\n<p>      EternalBlue was part of the Shadow Brokers April 14 dump of      NSA hacking tools. Almost immediately, since late April,      sophisticated attackers started repackaging the EternalBlue      exploit. Security firm Secdo reported that three weeks before the      WannaCry attack, at least three different actors were      leveraging the NSA EternalBlue exploit to infect, install      backdoors and exfiltrate user credentials in networks around      the world, including the US.    <\/p>\n<p>      The attack leaves no trace; by spawning threads inside      legitimate apps, to impersonate those apps, the attack can      evade advanced next-gen antivirus solutions. The attacks,      according to Secdo, might pose a much bigger risk than      WannaCry as many endpoints may still be compromised despite      having installed the latest security patch.    <\/p>\n<p>      The security firm suggested one threat actor was stealing      credentials using a Russian-based IP and another threat actor      seemed to be using EternalBlue in opportunistic attacks      to create a Chinese botnet.    <\/p>\n<p>      Secdo added:    <\/p>\n<p>        Even if companies were able to block WannaCry and patch the        SMB Windows exploit, a backdoor may persist and compromised        credentials may be used to regain access.      <\/p>\n<p>      Security firm Proofpoint spotted an attack using EternalBlue and      DoublePulsar to install a cryptocurrency mining botnet. This      attack, which also began before WannaCry, may be larger in      scale and may even have limited the spread of WannaCry      because this attack shuts down SMB networking to prevent      further infections with other malware via that same      vulnerability. Every time Proofpoint exposed a lab box      vulnerable to EternalBlue attacks, it was added to the      cryptocurrency mining botnet within 20 minutes.    <\/p>\n<p>      EternalRocks uses 7 NSA hacking tools    <\/p>\n<p>      Perhaps the most worrying news about attacks came from      researcher Miroslav Stampar. It is the most worrying because      the EternalRocks network worm doesnt just      use EternalBlue and DoublePulsar like WannaCry did. Oh no, it      uses seven different NSA hacking tools: EternalBlue,      Eternalchampion, Eternalromance, Eternalsynergy,      Doublepulsar, Architouch and SMBtouch.    <\/p>\n<p>      Stampar learned of EternalRocks after it      infected his SMB honeypot. Its original name was MicroBotMassiveNet, but EternalRocks is      listed as a product name under Taskhost Properties. It      disguises itself as WannaCry as if hoping to fool security researchers, yet it doesnt      drop ransomware. Instead, it seems to be gaining a foothold      to launch future attacks.    <\/p>\n<p>      During the first stage, EternalRocks installs TOR as a      C&C communications channel. The second stage doesnt      begin immediately; instead, the C&C server waits 24-hours before responding with      shadowbrokers.zip. Stampar said the delayed downloader for the      zipped file, which contains NSA hacking tools leaked by the      Shadow Brokers, seems to be a full scale cyber weapon.    <\/p>\n<p>      After that is unpacked, the EternalRocks worm begins scanning      for open 445 ports on the internet and pushes the first stage      of the malware through payloads.    <\/p>\n<p>      There is no kill switch like there was in WannaCry. Stampar      told Bleeping Computer, The worm is      racing with administrators to infect machines before they      patch. Once infected, he can weaponize any time he wants, no      matter the late patch.    <\/p>\n<p>      The second stage of the infection currently has a detection rate of 45\/61 on VirusTotal,      but Stampar warned that EternalRocks was going to be      huge.    <\/p>\n<p>      He later added:    <\/p>\n<p>        Ms. Smith (not her real name) is a freelance writer and        programmer with a special and somewhat personal interest in        IT privacy and security issues.      <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.networkworld.com\/article\/3197673\/security\/eternalrocks-network-worm-uses-7-nsa-hacking-tools.html\" title=\"EternalRocks network worm uses 7 NSA hacking tools | Network World - Network World\">EternalRocks network worm uses 7 NSA hacking tools | Network World - Network World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Ms.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/eternalrocks-network-worm-uses-7-nsa-hacking-tools-network-world-network-world\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-194135","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194135"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=194135"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194135\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=194135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=194135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=194135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}