{"id":194430,"date":"2017-05-23T22:32:12","date_gmt":"2017-05-24T02:32:12","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/doomsday-worm-uses-seven-nsa-exploits-wannacry-used-two-cnet\/"},"modified":"2017-05-23T22:32:12","modified_gmt":"2017-05-24T02:32:12","slug":"doomsday-worm-uses-seven-nsa-exploits-wannacry-used-two-cnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/doomsday-worm-uses-seven-nsa-exploits-wannacry-used-two-cnet\/","title":{"rendered":"&#8216;Doomsday&#8217; worm uses seven NSA exploits (WannaCry used two) &#8211; CNET"},"content":{"rendered":"<p><p>    Cybersecurity researchers have discovered    a new worm that uses seven of the NSA's leaked exploits.  <\/p>\n<p>    If the NSA's leaked hacking tools had a Voltron, it would be    EternalRocks.  <\/p>\n<p>    On Sunday, researchers confirmed new malware, named    EternalRocks, that uses seven exploits first discovered by    the National Security Agency and leaked in April by the Shadow    Brokers group. Experts described the malware as a \"doomsday\"    worm that could strike suddenly.  <\/p>\n<p>    Earlier this month, the WannaCry ransomware     plagued hospitals, schools and offices around the world and    spread to more than 300,000 computers. It uses two NSA exploits    that were leaked by the Shadow Brokers, EternalBlue and    DoublePulsar.    A few days later,     researchers found Adylkuzz, new malware that spread using    those same exploits and created botnets to mine for    cryptocurrency.  <\/p>\n<p>    Now, there's EternalRocks. Miroslav Stampar, a cybersecurity    expert for Croatia's CERT, first discovered the hodgepodge of    hacks on Wednesday. The earliest findings of EternalRocks goes    all the way back to May 3, he wrote in a description on GitHub.  <\/p>\n<p>    EternalRocks uses EternalBlue, DoublePulsar, EternalChampion,    EternalRomance, EternalSynergy, ArchiTouch and SMBTouch -- all    tools leaked by the Shadow Brokers. Stampar said he found the    packed hack after it infected his honeypot, a trap set to    monitor incoming malware.  <\/p>\n<p>    The majority of the tools exploit vulnerabilities with standard file    sharing technology used by PCs called Microsoft Windows    Server Message Block, which is how WannaCry spread so quickly    without being noticed. Microsoft patched these vulnerabilities    in March, but many outdated computers remain at risk.  <\/p>\n<p>    Unlike WannaCry, which alerts victims they've been infected    through ransomware, EternalRocks remains hidden and quiet on    computers. Once in a computer, it downloads Tor's private browser and sends a    signal to the worm's hidden servers.  <\/p>\n<p>    Then, it waits. For 24 hours, EternalRocks does nothing. But    after a day, the server responds and starts downloading and    self-replicating. That means security experts who want to get    more information and study the malware will be delayed by a    day.  <\/p>\n<p>    \"By delaying the communications the bad actors are attempting    to be more stealthy,\" Michael Patterson, CEO of security firm    Plixer, said in an emailed statement. \"The race to detect and    stop all malware was lost years ago.\"  <\/p>\n<p>    It even names itself WannaCry in an attempt to hide from    security researchers, Stampar said. Like variants of WannaCry,    EternalRocks also doesn't have a kill-switch, so it can't be as    easily blocked off.  <\/p>\n<p>    For now, EternalRocks remains dormant as it continues to spread    and infect more computers. Stampar warns the worm can be    weaponized at any time, the same way that WannaCry's ransomware    struck all at once after it had already infected thousands of    computers.  <\/p>\n<p>    Because of its stealthy nature, it's unclear how many computers    EternalRocks has infected. It's also unclear what EternalRocks    will be weaponized into. Plixer said the worm could be    immediately turned into more ransomware or trojan attacks for    banking.  <\/p>\n<p>    The NSA has been     widely criticized for holding onto these exploits without    warning the companies involved. On Wednesday, Congress    introduced a bill that would force the government to hand over its    cyber arsenal to independent review boards.  <\/p>\n<p>    The NSA didn't immediately respond to a request for comment.  <\/p>\n<p>    CNET    Magazine: Check out a sample of the stories in    CNET's newsstand edition.  <\/p>\n<p>    Logging    Out: Welcome to the crossroads of online life and    the afterlife.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.cnet.com\/news\/doomsday-worm-eternalrocks-seven-nsa-exploits-wannacry-ransomware\/\" title=\"'Doomsday' worm uses seven NSA exploits (WannaCry used two) - CNET\">'Doomsday' worm uses seven NSA exploits (WannaCry used two) - CNET<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cybersecurity researchers have discovered a new worm that uses seven of the NSA's leaked exploits. If the NSA's leaked hacking tools had a Voltron, it would be EternalRocks.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/doomsday-worm-uses-seven-nsa-exploits-wannacry-used-two-cnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-194430","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194430"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=194430"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194430\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=194430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=194430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=194430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}