{"id":194408,"date":"2017-05-23T22:28:53","date_gmt":"2017-05-24T02:28:53","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/eternalrocks-attack-spreads-while-using-same-exploit-as-wannacry-ransomware-yahoo-news-uk\/"},"modified":"2017-05-23T22:28:53","modified_gmt":"2017-05-24T02:28:53","slug":"eternalrocks-attack-spreads-while-using-same-exploit-as-wannacry-ransomware-yahoo-news-uk","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/eternalrocks-attack-spreads-while-using-same-exploit-as-wannacry-ransomware-yahoo-news-uk\/","title":{"rendered":"EternalRocks Attack Spreads While Using Same Exploit As WannaCry Ransomware &#8211; Yahoo News UK"},"content":{"rendered":"<p><p>    In the wake of the WannaCry ransomware attack that infected    more than 300,000 computers in 150 countries earlier this    month, another attack using    U.S. National Security Agency exploits has been discovered.  <\/p>\n<p>    The latest attack, known as EternalRocks, is a hybrid of    several NSA exploits leaked by hacking group the Shadow    Brokersthe same group that released the EternalBlue exploit    used to spread WannaCry.  <\/p>\n<p>    Read: WannaCry    Ransomware: How To Decrypt Your Files If You've Been Hit By    WannaCry  <\/p>\n<p>    Trending: Sex in Space: Sperm    Sent to International Space Station Produces Healthy    Micepaving Way for Extraterrestrial Babies?  <\/p>\n<p>    EternalRocks, which is also referred to as MicroBotMassiveNet,    was first discovered by    Miroslav Stampar, a security researcher and member of the    Croatian governments Computer Emergency Readiness Team (CERT).    Its believed the attack has been live since early May, before    the spread of WannaCry and after the start of a    cryptocurrency mining attack that began using the NSA    exploits in April.  <\/p>\n<p>    In a report posted on his GitHub account, Stampar said    EternalRocks currently has no payload, which means it is    currently not performing any malicious action. It is simply    spreading itself using a two-stage process that takes place    over a 24-hour period.  <\/p>\n<p>    The first stage of the attack infects a vulnerable Windows    machine that has not yet been patched to fix the MS17-010    vulnerabilitythe same vulnerability exploited by WannaCry that    was originally patched by Microsoft in March after being alerted to the    security hole by the NSA.  <\/p>\n<p>    Don't miss: Manchester Attack:    Watch James Corden's Tribute to the 'Strong, Proud and Caring'    People of U.K. City  <\/p>\n<p>    During the first stage, EternalRocks downloads its components    onto the infected device. It also downloaded the Tor browser,    an anonymous web browser that is often used to connect to dark    web sites that are not accessible through standard browsers.  <\/p>\n<p>    The second stage commences after a 24-hour period. During this    stage, the exploits are downloaded from a .onion domain, which    is reached by the Tor browser. EternalRocks then begins looking    for other open ports that it can connect to and spread itself    through.  <\/p>\n<p>    Read: WannaCry Ransomware    Attack: NSA Disclosed Vulnerability To Microsoft After Learning    It Was Stolen By Shadow Brokers  <\/p>\n<p>    Most popular: Europa League Final:    Five Ways Manchester United Could Lose to Ajax  <\/p>\n<p>    Stampar said EternalRocks spreads using all of the Microsoft    Server Message Block (SMB) exploits leaked by the Shadow    Brokers, including EternalBlue, EternalChampion,    EternalRomance, EternalSynergy, ArchiTouch, SMBTouch and    DoublePulsar.  <\/p>\n<p>    Andra Zaharia, a security evangelist at Heimdal Security,    wrote in a blog    post that while EternalRocks makes use of some of the same    exploits as WannaCry, it shows a long-term intent to make use    of vulnerabilities and seems focused on establishing a    launching pad for future attacks.  <\/p>\n<p>    Varun Badhwar, the CEO and co-founder of cloud security firm    RedLock, told International Business Times, attacks such as    this can spread even faster in the cloud where organizations    have no visibility into their workloads or network traffic.  <\/p>\n<p>    Badhwar warned that its no longer a matter of if, but    when any given organization will face a security incident    and said everyone must operate under the assumption that they    will get breached someday, and prepare for those scenarios in    advance by using proper security protocols to protect against    attacks.  <\/p>\n<p>    More from Newsweek  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/uk.news.yahoo.com\/eternalrocks-attack-spreads-while-using-214212036.html\" title=\"EternalRocks Attack Spreads While Using Same Exploit As WannaCry Ransomware - Yahoo News UK\">EternalRocks Attack Spreads While Using Same Exploit As WannaCry Ransomware - Yahoo News UK<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In the wake of the WannaCry ransomware attack that infected more than 300,000 computers in 150 countries earlier this month, another attack using U.S. National Security Agency exploits has been discovered. The latest attack, known as EternalRocks, is a hybrid of several NSA exploits leaked by hacking group the Shadow Brokersthe same group that released the EternalBlue exploit used to spread WannaCry <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/eternalrocks-attack-spreads-while-using-same-exploit-as-wannacry-ransomware-yahoo-news-uk\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-194408","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194408"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=194408"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194408\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=194408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=194408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=194408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}