{"id":195878,"date":"2017-06-01T22:18:00","date_gmt":"2017-06-02T02:18:00","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/if-you-think-wannacry-is-huge-wait-for-eternalrocks-data-center-knowledge\/"},"modified":"2017-06-01T22:18:00","modified_gmt":"2017-06-02T02:18:00","slug":"if-you-think-wannacry-is-huge-wait-for-eternalrocks-data-center-knowledge","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/if-you-think-wannacry-is-huge-wait-for-eternalrocks-data-center-knowledge\/","title":{"rendered":"If You Think WannaCry is Huge, Wait for EternalRocks &#8211; Data Center Knowledge"},"content":{"rendered":"<p><p>    Giridhara Raam is a Product Analyst for ManageEngine.  <\/p>\n<p>    While the world was responding to the WannaCry attack  which    only utilized the EternalBlue exploit and the DoublePulsar    backdoor  researchers discovered another piece of malware,    EternalRocks, which actually exploits seven different Windows    vulnerabilities.  <\/p>\n<p>    Miroslav Stampar, a security researcher at the Croatian    Government CERT, first discovered EternalRocks. This new    malware is far more dangerous than WannaCry. Unlike WannaCry,    EternalRocks has no kill switch and is designed in such a way    that its nearly undetectable on afflicted systems.  <\/p>\n<p>    Stampar found this worm after it hit his Server Message Block    (SMB) honeypot. After doing some digging, Stampar discovered    that EternalRocks disguises itself as WannaCry to fool    researchers, but instead of locking files and asking for    ransom, EternalRocks gains unauthorized control on the infected    computer to launch future cyberattacks.  <\/p>\n<p>    When EternalRocks hits a computer, it downloads a Tor browser    and connects that computer to its command and control (C&C)    server located in an unidentified location on the web. To avoid    detection, EternalRocks stays dormant in the infected computer    for 24 hours before activating and communicating with its    C&C server.  <\/p>\n<p>    In the early stages of the attack, EternalRocks shares an    archive containing all seven exploits with its C&C sever,    then downloads a component called svchost.exe to execute all    other actions and take over the infected system. Once thats    done, EternalRocks searches for open SMB ports to infect other    vulnerable computers.  <\/p>\n<p>    One of the main features of EternalRocks is that it can turn    into any major cyber weapon after successfully hijacking a    system. For instance, it can be converted into either    ransomware or a Trojan to cause more damage.  <\/p>\n<p>    EternalRocks exploits seven vulnerabilities, including:  <\/p>\n<p>    EternalBlue, EternalChampion, EternalSynergy and EternalRomance    are designed to exploit vulnerable computers, while    DoublePulsar is used to spread the worm across networks.    EternalRocks is far deadlier than WannaCry. Security    professionals have even named it the Doomsday Worm.  <\/p>\n<p>    With new malware being unleashed every day since WannaCry,    enterprises are looking for security solutions that can help    them stay secure in spite of all these attacks. Experts suggest    employing proper patch management procedures can keep your    network and devices safe from any unwanted security breaches.  <\/p>\n<p>    First WannaCry, then Adylkuzz, and now EternalRocks  all due    to a single leak of NSA hacking tools. The whole world    witnessed WannaCrys impact when it used just two SMB    vulnerabilities; imagine what EternalRocks can do with seven.    Security researchers are still investigating EternalRocks.    Until they neutralize the threat, you can stay safe and secure    by staying on top of patch management.  <\/p>\n<p>    Opinions expressed in the article above do not necessarily    reflect the opinions of Data Center Knowledge and Penton.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.datacenterknowledge.com\/archives\/2017\/05\/31\/think-wannacry-huge-wait-eternalrocks\/\" title=\"If You Think WannaCry is Huge, Wait for EternalRocks - Data Center Knowledge\">If You Think WannaCry is Huge, Wait for EternalRocks - Data Center Knowledge<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Giridhara Raam is a Product Analyst for ManageEngine. While the world was responding to the WannaCry attack which only utilized the EternalBlue exploit and the DoublePulsar backdoor researchers discovered another piece of malware, EternalRocks, which actually exploits seven different Windows vulnerabilities.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/if-you-think-wannacry-is-huge-wait-for-eternalrocks-data-center-knowledge\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-195878","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195878"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=195878"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195878\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=195878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=195878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=195878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}