{"id":196809,"date":"2017-06-06T05:55:32","date_gmt":"2017-06-06T09:55:32","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/leaked-nsa-hacking-exploit-used-in-wannacry-ransomware-is-now-powering-trojan-malware-zdnet\/"},"modified":"2017-06-06T05:55:32","modified_gmt":"2017-06-06T09:55:32","slug":"leaked-nsa-hacking-exploit-used-in-wannacry-ransomware-is-now-powering-trojan-malware-zdnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-nsa-hacking-exploit-used-in-wannacry-ransomware-is-now-powering-trojan-malware-zdnet\/","title":{"rendered":"Leaked NSA hacking exploit used in WannaCry ransomware is now powering Trojan malware &#8211; ZDNet"},"content":{"rendered":"<p><p>    Cybercriminals have taken the EternalBlue    exploits and used them to build more effective Trojans.  <\/p>\n<p>    A leaked NSA exploit which helped     the WannaCry ransomware outbreak become so prolific is now    being used to distribute Trojan malware.  <\/p>\n<p>    A Windows security flaw known as EternalBlue was one of many    allegedly known to US intelligence services and used to carry    out surveillance before being leaked     by the Shadow Brokers hacking group.  <\/p>\n<p>    The exploit leverages     a version of Windows' Server Message Block (SMB) networking    protocol to spread itself across an infected network using    wormlike capabilities.  <\/p>\n<p>    But while, for the most part, the spread of WannaCry has been    stopped, cybercriminals and hackers are still using the leaked    EternalBlue exploit to carry out a much more discreet form of    cyberattack,     say researchers at FireEye.  <\/p>\n<p>    This time, the SMB vulnerabilities are being used to distribute        Backdoor.Nitol - a Trojan horse which opens a backdoor on    the infected computer - and Gh0st RAT, a form of malware    capable of taking full control of a machine in addition to    conducting espionage and stealing data.  <\/p>\n<p>    The latter is particularly dangerous and is repeatedly a thorn    in the side of the aerospace and defence industries, as well as    government agencies     and even activists. Now those behind this new Gh0st RAT    campaign are using EternalBlue exploits in an effort to    compromise Singapore, while Nitol is attacking the wider South    Asia region.  <\/p>\n<p>    Researchers note that machines vulnerable to the SMB exploit    are attacked by hackers using the EternalBlue exploit to gain    shell access to the machine.  <\/p>\n<p>    The initial exploit used at the SMB level is similar to what's    been seen in WannaCry attacks, but this time, instead of being    used to deploy ransomware, the attack opens a shell to write    instructions into a VBScript file which is when executed to    retrieve the payload from another server in order to create the    required backdoor into the machine using Nitol or Gh0st RAT.  <\/p>\n<p>    While neither attack is new - both have plagued victims for    years - the addition EternalBlue adds additional potency to    attacks, although nothing so far has suggested that it could    spread so widely as quickly as WannaCry did.  <\/p>\n<p>    And with the EternalBlue exploits now out in the open for any    malicious actor to use, it's likely that we'll see it used    again and again in new types of attacks.  <\/p>\n<p>    \"The addition of the EternalBlue exploit has made it easy for    threat actors to exploit these vulnerabilities. In the coming    weeks and months, we expect to see more attackers leveraging    these vulnerabilities and to spread such infections with    different payloads,\" said researchers at FireEye Dynamic Threat    Intelligence.  <\/p>\n<p>    \"It is critical that Microsoft Windows users patch their    machines and update to the latest software versions as soon as    possible,\" they add.  <\/p>\n<p>    While WannaCry exploited the vulnerability to infect networks    across the globe,    poor-coding behind the ransomware played a part in it not    being as damaging as it could've been, resulting in those    behind it     not making much money, considering the scale of the    campaign.  <\/p>\n<p>    However, if something like Nitol or Gh0st RAT could    simultaneously infected hundreds of thousands across the globe    - and the nature of the Trojan attacks means they wouldn't be    obvious about it -     then future attacks could have much worse consequences.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.zdnet.com\/article\/leaked-nsa-hacking-exploit-used-in-wannacry-ransomware-is-now-powering-trojan-malware\/\" title=\"Leaked NSA hacking exploit used in WannaCry ransomware is now powering Trojan malware - ZDNet\">Leaked NSA hacking exploit used in WannaCry ransomware is now powering Trojan malware - ZDNet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cybercriminals have taken the EternalBlue exploits and used them to build more effective Trojans. A leaked NSA exploit which helped the WannaCry ransomware outbreak become so prolific is now being used to distribute Trojan malware. A Windows security flaw known as EternalBlue was one of many allegedly known to US intelligence services and used to carry out surveillance before being leaked by the Shadow Brokers hacking group <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-nsa-hacking-exploit-used-in-wannacry-ransomware-is-now-powering-trojan-malware-zdnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-196809","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/196809"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=196809"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/196809\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=196809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=196809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=196809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}