{"id":200728,"date":"2017-06-23T05:56:05","date_gmt":"2017-06-23T09:56:05","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-miner-digging-into-pcs-based-on-nsa-exploit-security-intelligence-blog\/"},"modified":"2017-06-23T05:56:05","modified_gmt":"2017-06-23T09:56:05","slug":"cryptocurrency-miner-digging-into-pcs-based-on-nsa-exploit-security-intelligence-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cryptocurrency-miner-digging-into-pcs-based-on-nsa-exploit-security-intelligence-blog\/","title":{"rendered":"Cryptocurrency Miner Digging Into PCs Based On NSA Exploit &#8211; Security Intelligence (blog)"},"content":{"rendered":"<p><p>    Its been a tough year for the National Security Agency (NSA),    and hacking group Shadow Brokers is responsible for much of    the trouble. Over the past few months, theyve leaked more than    a few implants  the NSA term for malware code  developed by    the agency.  <\/p>\n<p>    Recently, the agencys DOUBLEPULSAR tool was used to help    spread the massive malware attack WannaCry. Bleeping Computer noted that its now on    the hunt again, this time digging in with a Monero    cryptocurrency miner on PCs running unsecured Server Message    Block (SMB) devices.  <\/p>\n<p>    According to the International Business Times, the new    malware strain goes by the unassuming name Trojan.BtcMine.1259.    First detected by Russian antivirus firm Dr. Web, the attack    targets computers running unsecured SMB protocols and downloads    a malware loader onto the machine. It then scans for minimal    kernel threads. If PCs have enough resource room to spare, the    download grabs the cryptocurrency miner and goes to work.  <\/p>\n<p>    Based on current infection data, according to the International    Business Times, researchers believe the new malware strain    leverages DOUBLEPULSAR to gain access, parts of the Ghost RAT    library to communicate with its command-and-control (C&C)    server and other malware variants to carry out its attack. Once    compromised, victim PCs mine Monero currency in the background    and send the proceeds back to cybercriminals.  <\/p>\n<p>    Why Monero? As Live Bitcoin News explained, this    cryptocurrency is among the fastest-growing in the digital    money market. It presents an ideal opportunity for fraudsters    looking to avoid the scrutiny that comes with more traditional    bitcoin transactions.  <\/p>\n<p>    Updating to the latest Windows version should protect corporate    devices from this newest attack. While DOUBLEPULSAR infections    peaked at 100,000 in early April, the number fell to just    16,000 this month thanks to the MS17-010 patch, Bleeping    Computer reported.  <\/p>\n<p>    DOUBLEPULSAR isnt the first NSA tool leaked by the Shadow    Brokers. In April, the group also released the EternalBlue    exploit, which was used to carry out surveillance activities,    according to     ZDNet. It was subsequently adopted by fraudsters to attack    targets in Singapore using the Ghost RAT Trojan and other parts    of South Asia using Backdoor.Nitol.  <\/p>\n<p>    This exploit also leveraged SMB vulnerabilities and is rendered    useless by proper Windows patching. Since many PCs arent    regularly updated or run older versions of the OS no longer    covered by Windows support, however, CyberScoop argued that the tool will be    used for years to come by both sophisticated cybercriminals and    amateurs.  <\/p>\n<p>    As Bob Wandell, former information assurance chief of the U.S.    Department of Defense (DoD), explained to CyberScoop, The    payloads that can be loaded onto EtnernalBlue are boundless and    uniformly malicious.  <\/p>\n<p>    Even government-built malware isnt safe from theft and    compromise. Exploits such as EternalBlue give cybercriminals    long-term access options, while backdoors such as DOUBLEPULSAR    provide ways for attackers to jump on the newest malware    bandwagon: background cryptocurrency mining.  <\/p>\n<p>    Fraudsters will take what they can get. Theyll innovate if    needed, but they prefer to leverage tools from other sources    that can quickly compromise thousands of machines.  <\/p>\n<p>    Its another case study for regular security updates and    continual monitoring of network services. Supposed IT safety    only lasts until attackers discover how to break down the door,    steal the key or dig a tunnel.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securityintelligence.com\/news\/cryptocurrency-miner-digging-into-pcs-based-on-nsa-exploit\/\" title=\"Cryptocurrency Miner Digging Into PCs Based On NSA Exploit - Security Intelligence (blog)\">Cryptocurrency Miner Digging Into PCs Based On NSA Exploit - Security Intelligence (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Its been a tough year for the National Security Agency (NSA), and hacking group Shadow Brokers is responsible for much of the trouble. Over the past few months, theyve leaked more than a few implants the NSA term for malware code developed by the agency <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/cryptocurrency-miner-digging-into-pcs-based-on-nsa-exploit-security-intelligence-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-200728","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200728"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=200728"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200728\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=200728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=200728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=200728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}