NSA Exploits Used By Worm-cryptominer Combo To Attack Systems

It has been reported that security researchers recently found and analysed a worm-cryptominer combo that pauses the resource-intensive cryptomining process if it finds popular games running on the victim’s machine.. The malware combines Python and PowerShell to create a cryptocurrency miner, which also has a worm-like component that helps it move laterally and infect victims by using vulnerabilities such as the NSA-linked EternalBlue.

Subscribe
Notify of
guest
1 Expert Comment
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Emile Monette
Emile Monette , Director of Value Chain Security
InfoSec Expert
August 22, 2019 5:25 pm

An important mitigation that organisations might consider is the practice of requiring all software updates to be validated by the manufacturer prior to deployment at the organisation. That validation often includes verifying that the software is genuine, identifying and mitigating known vulnerabilities and weaknesses, as well as static, dynamic, and fuzz testing, among other security methods, dependent on the risk posture of the organisation.

Last edited 2 years ago by Emile Monette
Information Security Buzz
1
0
Would love your thoughts, please comment.x
()
x