Digital pre-digging tool infects Windows computers via EternalBlue and WMI
A newly discovered malware family called CoinMiner is causing many users and companies to secure many problems, making it difficult to prevent or detect the combination of many unique features.
Malware - a digital digging tool - uses the NSA EternalBlue vulnerability to infect victims and the WMI toolkit (Windows Management Instrumentation) as a way of running commands on infected systems. In addition, CoinMiner runs on memory (malware without fileless files), uses multiple command classes and control servers to deploy the necessary scenarios to infect victims.
All of this creates a mixture of trouble for older computers, running anti-virus software is no longer suitable for new infection techniques.
Avoid getting infected with CoinMiner by turning off SMBv1
To avoid infection with CoinMiner, there are a number of measures users need to take. The simplest is to prevent the first infection, EternalBlue, a SMB vulnerability developed by the NSA and leaked online by Shadow Brokers hacker group. It is also used in attacks on WannaCry and NotPetya.
Users need to be sure to install Microsoft's MS17-010 security patch or at least turn off the SMBv1 protocol on their machines so that CoinMiner has no way of approaching.
Turn off WMI
In case the above protocol needs to be used to get network interaction, it is still possible to avoid CoinMiner by protecting itself from the second exploit of malware, which is WMI - the toolkit integrated in Windows versions. .
CoinMiner uses WMI to download scripts and other necessary components to infect computers and then download and run the real CoinMiner binary file.
CoinMiner computer infiltration process
Trend Micro, the company that discovered CoinMiner, recommends turning off WMI on a machine if it is not needed or at least restricting access to WMI to just one admin account, only IT staff.
Instructions on how to turn off SMBv1 and WMI are given at this address https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1-smbv2-and-smbv3- in-windows-and-windows and https://msdn.microsoft.com/en-us/library/aa826517(v=vs.85).aspx . For more detailed information, Trend Micro also released a detailed step-by-step technical report of CoinMiner. http://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-miner-uses-wmi-eternalblue-spread-filelessly/
CoinMiner is not the first digital digging tool to use EternalBlue to attack victims. Adylkuzz is the first malware of its kind, starting to attack shortly after the Shadow Brokers team leaked it on the network. On the other hand, CoinMiner is one of the few less-than-non-program-based virtual money digging tools.
You should read it
- New malware-digging tool on Linux devices
- Eternal Blues - NSA's EternalBlue vulnerability testing tool
- WannaCry is a year old, EternalBlue is bigger than you think
- Can Threadripper CPU dig up 'peer' pre-coding with VGA GTX 1080?
- History of digging a bitcoin, from a regular CPU to an ASIC system
- Hacker hijack CoinHive DNS to dig virtual money with thousands of websites
- Samsung produces dedicated chips to dig virtual money
- Many computers in Vietnam have been hijacked due to virus infection
May be interested
- How to build super-energy Ethereum digging systemeffective extraction of cryptocurrency will save you money and resources. the trick is to maximize the speed per watt or reduce the overall energy of the system. below are the component and configuration settings needed to maximize the energy performance of computers that help ethereum cryptocurrency mining.
- Many computers in Vietnam have been hijacked due to virus infectionaccording to bkav, hundreds of thousands of computers in vietnam are hijacked due to virus infection.
- How to Use Procreate as a Digital Notetaking and Archiving Tooljournaling will transform your productivity, but keeping up with physical tools can be a hassle. procreate offers the perfect digital solution, allowing creativity and organization to blend.
- WannaCry is a year old, EternalBlue is bigger than you thinktoday 12/5, commemorating the 1st anniversary of wannacry extortion's virulence broke out into a global 'pandemic'.
- History of digging a bitcoin, from a regular CPU to an ASIC systembitcoin digging is just a hobby for those who are passionate about virtual money. previously just a normal computer was enough to dig bitcoin, but after nearly 10 years, everything changed a lot.
- Windows Media Player poisoned users to Quick Timeworm_vb.zaa is a new virus that attacks and infects windows computers, they spread when users activate windows media player. security company trend micro indicates this virus & atild
- Learn and use the Windows Malicious Software Removal Toolthe microsoft windows malicious software removal tool (msrt) helps remove malware from windows computers. this tutorial will show you how to open and use the malicious software removal tool to scan and remove specific common malware in windows.
- 5 free digital Whiteboard solutions to replace the Whiteboard application of Microsoft and Googlethe whiteboard application is an important collaboration tool during team work. and the time has come for the whiteboard app to be digital.
- Malicious ads dig virtual money right on the browserthe author of the malicious code uses javascript code transmitted via malvertising and digs a lot of digital currency on the user's browser without them knowing.
- Bitcoin digging around the world consumes electricity in a countrythe power consumption of bitcoin mining in the world at the end of 2018 reached 7.67 gigawatts. the amount of electricity consumed by bitcoin is equivalent to the whole of ireland.