Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

New EternalBlue Family Member Takes Aim at Asian Web Servers

Beapy is a new malware variant that's storming across China, leaving cryptominers in its wake.

A new variant of the EternalBlue exploit is hitting hundreds of businesses in China. The cyptojacking campaign, dubbed "Beapy" for one of the principal files used in the attack, uses email for its initial infection vector and then spreads laterally through a network, leaving a cryptominer wherever it goes.

In a blog post by the Security Response Attack Investigation Team at Symantec, researchers note that Beapy is continuing a tactic previously seen in the Bluwimps worm: focusing cyptominer activity at enterprise networks.

The infection chain begins with a weaponized Excel file attached to a phishing email. Once opened by the recipient, the file downloads a DoublePulsar backdoor to the computer. DoublePulsar was one of the exploits leaked in the Shadow Brokers file dump, just like EternalBlue. And this isn't the first time criminals have turned to this state-developed exploit: It was also used in 2017's WannaCry ransomware campaign.

Alan Neville, threat intelligence analyst at Symantec, says that once the bogus spreadsheet is launched, "it would then download Beapy onto their machines, and then it would try to spread across the networks, either using EternalBlue or dumping network credentials." The credential dump is especially dangerous because "... essentially, once you have network credentials, you become a legitimate user," he says. "That makes it very easy for the likes of Beapy to spread across networks very, very quickly, then download and install this coin-mining software."

While the Beapy campaign is not currently focused on data exfiltration, Jonathan Bensen, CISO and senior director of product management at Balbix, says it's still a serious problem. "Cryptojacking should not be viewed as a victimless crime," he says. "Besides drastically slowing down computers and causing device degradation, Beapy, in particular, leverages open source credential stealing capabilities to aid in its spread throughout an enterprise's network."

And even though Beapy isn't currently exfiltrating data, once the data is captured there's nothing to prevent the current Beapy controllers from eventually adding stolen credentials to the cryptocurrency they're taking from the victim's network.

And there is evidence that Beapy will not be limited to cryptocurrency mining. According to the Symantec report, Beapy has targeted Web servers as one of its hosts, and early versions of the software contained Mimikatz modules for credential theft. These versions targeted Apache Tomcat and Oracle WebLogic servers beginning in early February, with activity continuing to the present time.

Neville says the Beapy attack is very profitable because "the file basically allows cybercriminals to be able to mine cryptocurrencies a lot faster than some of the traditional methods that we've seen in the past. It's just a coin hive, where it was embedded within browsers to be able to generate some revenue by mining cryptocurrencies within a browser just by visiting websites."

This, Neville says, lets the malware leverage the CPU itself and allows cybercriminals to mine coins much faster. The fast mining is aided by the lack of any "throttle" that the team has seen — Beapy and its miner will take every CPU cycle the system can make available, bringing legitimate enterprise software to a halt.

Protection from Beapy begins behind the keyboard, says Stuart Reed, vice president at Nominet. "The best defense against these attacks combines education — empowering and even rewarding employees for spotting problem emails, then alerting others — with technologies to monitor the network and identify malicious activity before the damage can be done."

In addition to training, there's another critical step that organizations should take, Neville says. "It's very important to have your systems patched. Any systems that aren't patched against EternalBlue are vulnerable to this attack," he says.

Organizations beyond China should keep this in mind, as well. "There's nothing specific that we came across as part of our analysis that would suggest that [Beapy is] targeting specific software or systems within China, and it could definitely be utilized to spread farther," Neville says.

Related Content:

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...