{"id":198244,"date":"2017-06-12T19:49:13","date_gmt":"2017-06-12T23:49:13","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/attackers-mining-cryptocurrency-using-exploits-for-samba-threatpost\/"},"modified":"2017-06-12T19:49:13","modified_gmt":"2017-06-12T23:49:13","slug":"attackers-mining-cryptocurrency-using-exploits-for-samba-threatpost","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/attackers-mining-cryptocurrency-using-exploits-for-samba-threatpost\/","title":{"rendered":"Attackers Mining Cryptocurrency Using Exploits for Samba &#8230; &#8211; Threatpost"},"content":{"rendered":"<p><p>    Unknown attackers are using a recently patched     vulnerability in Samba to spread a resource-intensive    cryptocurrency mining utility. To date, the operation has    netted the attackers just under $6,000 USD, but the number of    compromised computers is growing, meaning that a significant    number of Samba deployments on *NIX servers remain unpatched.  <\/p>\n<p>    The attack also demonstrates that the vulnerability in Samba,    CVE-2017-7494,    can extend EternalBlue-like attacks into Linux and UNIX    environments. Samba is a software package that runs on Linux    and UNIX servers and sets up file and print services over the    SMB networking protocol, integrating those services into a    Windows environment.  <\/p>\n<p>    The     Samba vulnerability is similar to the SMB bug exploited on    May 12 by attackers using the NSAs EternalBlue exploit to    spread     WannaCry ransomware. Experts warned that EternalBlue can be    fitted with any measure of attack, and they have a similar    message about this flaw, which has been nicknamed SambaCry.  <\/p>\n<p>    Researchers at Kaspersky Lab said that one of their honeypots    snagged on May 30 some of the first exploits targeting the    Samba vulnerability. The payload was a two-headed threat: a    Linux backdoor and a mining utility called Cpuminer that is    leveraging the processing power of its victims to create Monero    cryptocurrency.  <\/p>\n<p>    The attacked machine turns into a workhorse on a large farm,    mining crypto-currency for the attackers, Kaspersky Lab said    in a report    published on Securelist.com.  <\/p>\n<p>    The researchers said the attackers Monero wallet and pool    address are hardcoded in the attack.  <\/p>\n<p>    According to the log of the transactions, the attackers    received their first crypto-coins on the very next day, on    April 30th, Kaspersky Lab said. During the first    day they gained about 1 XMR (about $55 according to the    currency exchange rate for 08.06.2017), but during the last    week they gained about 5 XMR per day. This means that the    botnet of devices working for the profit of the attackers is    growing.  <\/p>\n<\/p>\n<p>    As of Friday, the attackers had mined about $6,000 USD, and    Kaspersky Lab said it was unsure about the scale of the attack.    Upon disclosure of the Samba vulnerability almost three weeks    ago, Rapid7 said an internet scan using its    ProjectSonarsoftware found more than 104,000 endpoints    running vulnerable versions of Samba over port 445, the SMB    port. More than 92,000 are running versions of Samba that have    no patches available. The vulnerability was introduced into    Samba in 2010 in version 3.5.0; admins should upgrade to    patched versions: 4.6.4, 4.5.10 and 4.4.14.  <\/p>\n<p>    Kaspersky Lab said the exploit is assembled as a Samba plugin,    below. After running a checka file containing random    symbolsto see whether the server has write permissions for the    network, the attack must then brute-force the full path to    dropped file. The most obvious paths are laid out in Samba    instruction manuals, Kaspersky Lab said. Once it finds the    path, the exploit is loaded and executed in the context of the    Samba server process using the vulnerability; it runs only in    virtual memory.  <\/p>\n<\/p>\n<p>    Kaspersky Lab said the attacks captured by its honeypot    contained two files, a Linux backdoor and the miner.    INAebsGB.soandcblRWuoCc.so respectively.    INAebsGB.sois a reverse shell that connects to the port    of the IP address specified by the owner giving it remote    access to the shell.  <\/p>\n<p>    As a result, the attackers have an ability to execute remotely    any shell-commands. They can literally do anything they want,    from downloading and running any programs from the Internet, to    deleting all the data from the victims computer, Kaspersky    Lab said, adding that this is similar to the SambaCry exploit    in Metasploit.  <\/p>\n<p>    The other file, cblRWuoCc.so, downloads and executes Cpuminer    from a domain registered on April 29.  <\/p>\n<p>    Coincidentally, another set of attackers used EternalBlue to    spread a cryptocurrency miner called     Adylkuzz for Monero on Windows machines. Monero is marketed    as a privacy conscious cryptocurrency, and goes to great    lengths to obfuscate its blockchain making it a challenge to    trace any activity.  <\/p>\n<p>    The Adylkuzz attacks pre-date WannaCry with the first samples    going back to April 24, researchers at Proofpoint said. More    than 20 virtual private servers were scanning the internet for    targets running port 445 exposed, the same port used by SMB    traffic when connected to the internet, and the same port    abused by EternalBlue and DoublePulsar.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/threatpost.com\/attackers-mining-cryptocurrency-using-exploits-for-samba-vulnerability\/126191\/\" title=\"Attackers Mining Cryptocurrency Using Exploits for Samba ... - Threatpost\">Attackers Mining Cryptocurrency Using Exploits for Samba ... - Threatpost<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Unknown attackers are using a recently patched vulnerability in Samba to spread a resource-intensive cryptocurrency mining utility.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/attackers-mining-cryptocurrency-using-exploits-for-samba-threatpost\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-198244","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198244"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=198244"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198244\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=198244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=198244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=198244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}