How to prevent EternalRocks malicious code
After the cyberattack from WannaCry, cyber security researchers have discovered more EternalRocks malicious code, supposedly more powerful than WannaCry.
The way EternalRocks works is to exploit vulnerabilities in the SMB file sharing protocol on the Windows operating system, thereby spreading to computers. However, while WannaCry only took advantage of two vulnerabilities, EternalBlue and DoublePulsar, EternalRocks exploited seven vulnerabilities.
- EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
1. Malicious code EternalRocks attack the computer
The way EternalRocks works is similar to Wanna Cry, which is to exploit the vulnerability in the data sharing protocol on Windows computers that is Microsoft Windows Server Message Block.
More dangerous, this malicious code secretly makes software or antivirus programs, malware detection difficult to detect. The seven vulnerabilities that EternalRocks exploits and uses indicate that the level of danger of this type of malware affects the network security system.
- EternalBlue: SMBv1 exploit tool.
- EternalRomance: SMBv1 exploit tool.
- EternalChampion: SMBv2 exploit tool.
- EternalSynergy: SMBv3 exploit tool.
- SMBTouch: SMB reconnaissance tool.
- ArchTouch: SMB reconnaissance tool.
- DoublePulsar: SMB reconnaissance tool.
DoublePulsar ArchTouch, SMB Touch are 3 SMB reconnaissance tools to scan SMB ports. Meanwhile, 4 vulnerabilities, EternalBlue, EternalChampion, EternalSynergy and EternalRomance, increase the chances of Windows computers being more vulnerable.
Cyber security expert Miroslav Stampar said EternalRocks has control over all affected computers, in order to expand the scale of attacks to most computers worldwide.
2. How to prevent EternalRocks malicious code
Until now, EternalRocks is still in a "hidden" state and "dormant" so the way to prevent and destroy EternalRocks like Wanna Cry has not been found by cyber security researchers. However, users should use preventive methods before becoming one of the victims of EternalRocks.
You can use the ways to prevent WannaCry malicious code that the Network Administrator introduced in the previous articles. We need to update antivirus software, detect malicious code for the computer. In particular, you need to update the latest Windows patches that Microsoft provides.
- Microsoft released an emergency patch to prevent ransomware from attacking
- With the NMR's 15 free Ransomware decoding tools, you won't need to ransom the file anymore
- How to remove / fix ransomware WannaCry
You can also close port 445 on Windows to prevent malicious code. Readers refer to the article How to close the port / Port 445 on Windows 2000 / XP / 2003 to Windows 10 to prevent ransomware WannaCry.
You should read it
- EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
- Download the free WannaCry malware checker now
- How to identify WannaCry malicious code from Vietnam Computer Emergency Response Center (VNCERT)
- Malware Judy attacked more than 36.5 million Android phones
- All about WannaCry, Ransomware has been confusing for the past few days
- Prevent WannaCry variants by turning off this Windows 10 installation
- 9 things to do when detecting a computer infected with malware
- How many types of malware do you know and how to prevent them?
May be interested
- Summary of effective Anti-Ransomware softwarebefore the attack of malicious code wannacry or eternalrocks, ... to the computer system, installing some anti-ransomware software is essential.
- Malicious code is growing upsecurity firm mcafee warns that malicious code is currently on the way to prepare to reach a new level of complexity and professionalism. not only the malicious code and adware are now becoming a professionally distributed service
- New weapons against malicious code are 'cloud' computing.the 'cloud computing' model of remote server-based data processing and results returned to the pc will incorporate 10 antivirus engines and two hackers to detect hackers to prevent the malicious code.
- 10 million Android devices are preinstalled with malicious code from the factorybad guys have compromised with the manufacturer to install malicious code on the device.
- Research: The golden time to prevent malicious code after the system is compromisedmost ransomware is usually deployed three days after a hacker successfully enters an organization's network.
- Detects malicious code showing porn ads in children's games on Google Playcheck point security company has discovered malicious code called adultswine that appears in children's games on google play.
- What malicious code is designed to spread through IoT devices?mirai is a malicious code designed to spread through iot devices. click to see this article now to learn how to prevent your computer from being infiltrated by malicious codes!
- Malware sneaks into iOS through Apple's official distribution channelstaking advantage of distribution channels of unapproved applications for testing purposes, malicious code has quietly sneaked into ios users' devices.
- Appearing dangerous Android malicious code specializing in stealing chat content on Facebook Messenger, Skype ...a type of malware that has a package name is com.android.boxa that can steal users' private chat data on current messaging applications such as facebook messenger, skype, etc., by experts from the company. network security trustlook detected on android operating system.
- Discover a new kind of malicious code that can record the phone call to extort moneyreddrop is one of the most sophisticated android malware that researchers have ever seen spread widely.