Although it sounds impressive, ESET says that this malware author does very little. Modifying the exploit code is very sketchy, the Monero digging tool is just another version of an open source project called xmrig, version 0.8.2 (released on May 26, 2017).
'We do not know which attackers use the scanning software to find a vulnerable machine but there are many sample code and exploit software available, we think they don't have to do much,' said Michal Poslusny, researcher. at ESET said.
The revision of the Monero digging tool and the same update date is a day so maybe the update is not time consuming or complicated. Still, the attacker still made a lot of money.
Malware digging virtual money is increasing
ESET says bad guys scan for IIS 6.0 servers from the end of May and after several interruptions, they are still working.
'Malware digging virtual money is not new but they are skyrocketing because of many factors,' Poslusny said. The two competitors of ESET also saw the same thing. In the past two weeks, Kaspersky reported more than 1.65 million malware-infected computers dig virtual currency in the first 8 months of the year. IBM also reported an increase in virtual currency malware on the enterprise network. Behavior of digging virtual money on the browser also spread.
There was a patch
Windows Server users still currently run IIS 6.0 to update the Microsoft patch released in June. Https://blogs.windows.com/windowsexperience/2017/06/13/microsoft-releases-additional-updates-protect- potential-nation-state-activity / and https://blogs.technet.microsoft.com/msrc/2017/06/13/june-2017-security-update-release/ . Microsoft released this patch after Windows XP and Server 2003 achieved End-of-Life scores many years ago.
The exploited IIS 6.0 vulnerability this time with CVE identified as EXPLODINGCAN NSA leaked from Shadow Brokers in April. Microsoft patched KB3197835 to fix it.
If unable to update from the Microsoft patch, sysadmin can find the patch of another network security company.https://pages.ensilo.com/download-the-patch-for-esteemaudit-exploit
a newly discovered malware family called coinminer is causing many users and companies to secure many problems, making it difficult to prevent or detect the combination of many unique features.
recently, amd has stated that its threadripper cpu is also capable of generating money from coding crypto as much as high-end vga. even compared to the series of buffalo plows, which can only be used to dig money, cpu threadripper has an advantage because while digging up coding money you can still do other things or play games.
cryptojacking is a new way of using criminals to make money with your hardware. when opening a website in your browser, cryptojacking malware can use the cpu to the maximum to exploit cryptocurrency and it is becoming increasingly popular.
bitcoin digging is just a hobby for those who are passionate about virtual money. previously just a normal computer was enough to dig bitcoin, but after nearly 10 years, everything changed a lot.
a giant cryptocurrency botnet called smominru, which has taken control of more than half a million computers worldwide, has been discovered by security researchers. this botnet spreads the eternalblue lane, the nsa's wannacry exploit method developed but accidentally revealed it.
recently, security researchers have found some malware hosted on the google sites platform to build on websites. however, the real threat lies in the fact that a fraudster who steals information can take advantage of this flaw to send the victim's data to their own controlled mysql server simply and quickly. .
the power consumption of bitcoin mining in the world at the end of 2018 reached 7.67 gigawatts. the amount of electricity consumed by bitcoin is equivalent to the whole of ireland.
there may be a variety of reasons that you would need to identify and locate the owner of a vehicle. perhaps you witnessed or were the victim of a hit-and-run accident. maybe it's a car that you have recently sold and have some need to...
selecting a satisfactory branch / peach tree to display on tet holiday is quite a difficult thing for those who have not experienced because it has many different varieties: digging, digging, digging, digging, digging branches jar, peach bonsai grown on pots ...
the malware issue is not new and we cannot chase them away immediately. in fact, we have spent a lot of money dealing with criminals using trojans, viruses and bots. not just users