NSA Exploits Used By Worm-cryptominer Combo To Attack Systems

It has been reported that security researchers recently found and analysed a worm-cryptominer combo that pauses the resource-intensive cryptomining process if it finds popular games running on the victim’s machine.. The malware combines Python and PowerShell to create a cryptocurrency miner, which also has a worm-like component that helps it move laterally and infect victims by using vulnerabilities such as the NSA-linked EternalBlue.


EXPERTS COMMENTS
Emile Monette, Director of Value Chain Security ,  Synopsys
August 22, 2019
An important mitigation that organisations might consider is the practice of requiring all software updates.
An important mitigation that organisations might consider is the practice of requiring all software updates to be validated by the manufacturer prior to deployment at the organisation. That validation often includes verifying that the software is genuine, identifying and mitigating known vulnerabilities and weaknesses, as well as static, dynamic, and fuzz testing, among other security methods, dependent on the risk posture of the organisation.

Join the Conversation

Join the Conversation


In this article