SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools
Date    Monday June 17 2019, @07:41AM
Author    martyb
Topic   
from the the-best-defense-is-not-always-the-best-offence dept.
https://soylentnews.org/article.pl?sid=19/06/17/0246239

upstart writes in with a submission, via IRC, for SoyCow4463.

Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools:

Security researchers have discovered an ongoing cryptojacking campaign which infects unpatched computers of businesses from all over the world with XMRig Monero miners using Equation group's leaked exploit toolkit.

The cybercriminals behind this cryptomining campaign use the NSA-developedEternalBlue and EternalChampion SMB exploits to compromise vulnerable Windows computers, exploits which were leaked by the Shadow Brokers hacker group in April 2017.

While Microsoft patched the security flaws these tools abused to break into Windows machines [1, 2, 3], there are still a lot of exposed computers because they haven't been updated to newer OS versions not being impacted by these very dangerous vulnerabilities.

[...] The hackers are using a "shotgun" method of attack, choosing to compromise any vulnerable machine they can find and not stopping to cherry-pick as it happens in the targeted attacks conducted by experienced malicious actors which usually impact companies.

This shows that "entry-level cybercriminals are gaining easy access to what we can consider “military-grade” tools — and are using them for seemingly ordinary cybercrime activity."

[...] An auto-spreading EternalBlue-based backdoor and a variant of the Vools Trojan is used as the main tool to deploy roughly 80 variants of the XMRig cryptocurrency miners on infected computers, using five different mining configurations with similar usernames and identical passwords.

The cryptominer binary is always dropped in the infected system's system32 or SysWOW64 folders, with the miner variant being the one which decides what folder is chosen to drop the XMRig payload.


Original Submission

Links

  1. "upstart" - https://soylentnews.org/~upstart/
  2. "Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools" - https://www.bleepingcomputer.com/news/security/hackers-infect-businesses-with-cryptominers-using-nsa-leaked-tools/
  3. "NSA-developed" - https://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978-11e7-a058-ddbb23c75d82_story.html
  4. "EternalBlue" - https://www.bleepingcomputer.com/news/security/eternalblue-nsa-exploit-becomes-commodity-hacking-tool-spreads-to-other-malware/
  5. "EternalChampion" - https://www.bleepingcomputer.com/news/security/shadow-brokers-release-new-files-revealing-windows-exploits-swift-attacks/
  6. "1" - https://support.microsoft.com/en-us/help/4013389/title
  7. "2" - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0146
  8. "3" - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147
  9. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=34447

© Copyright 2024 - SoylentNews, All Rights Reserved

printed from SoylentNews, Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools on 2024-04-24 17:17:42