Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/18/2017
12:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

NSA Tools Behind WannaCry Being Used In Even Bigger Attack Campaign

Attackers have been using NSAs EternalBlue and Double Pulsar to distribute AdylKuzz cryptocurrency malware to hundreds of thousands of systems, Proofpoint says.

The WannaCry ransomware outbreak this week garnered widespread attention for its sheer global scope and audacity but another likely even bigger attack leveraging the same stolen NSA exploits has been going on unnoticed potentially since the last week of April.

Security vendor Proofpoint Tuesday said it had identified a massive campaign to install Adylkuzz, a crypto-currency mining tool, on hundreds of thousands of systems worldwide.

As with WannaCry, the threat actors behind the Adylkuzz campaign are using the NSA's leaked EternalBlue exploit to target legacy Windows systems running a vulnerable version of the Microsoft Server Message Block (SMB) protocol.

"Upon successful exploitation via EternalBlue, machines are infected with DoublePulsar," which then downloads and runs Adylkuzz from another host system, Proofpoint said in an alert.

Once installed, Adylkuzz blocks all SMB communications on the infected system, looks for and stops any previous instances of itself on the same computer and then downloads a cryptominer and mining instructions.

Adylkuzz is not ransomware. Rather it is a so-called "miner" for Monero, a cryptocurrency that is similar to, but not as widely used as, bitcoin.

Computers infected with Adylkuzz become part of a broad distributed banking network for Monero, says Kevin Epstein vice president of threat operations at Proofpoint. "It is used as part of that network, largely for maintaining accounting or bookkeeping transactions within that network, as well [as for] money supply," he says.

In compensation for the use of the computer, the network typically pays a small fee equivalent to around $205 at current exchange rates to the miner, which in this case would really be the attacker that installed Adylkuzz.

Individual laptops might only generate a few dollars on a weekly basis but the collective payout from all of the infected systems easily tops five-figures daily, Epstein says.

Because no encryption or ransom demands are involved, victims of Adylkuzz do not realize they have been compromised. Degraded PC and server performance and the loss of access to shared Windows resources are often the only indications of a compromise, Epstein says.

Several large organizations that eported experience network performance issues this week were likely victims of the AdylKuzz campaign considering the timing of the incidents and the fact that none of them reported receiving ransomware notices.

"The malware is deliberately stealthy," Epstein says. "Users will only notice their Windows machine is running slowly and that they don't have access to shared Windows resources."

Proofpoint security researchers discovered the Adylkuzz attack while investigating the WannaCry campaign. It found that the attacks are being launched from multiple virtual private servers, which are also being used to massively scan the Internet for other systems to exploit.

Available data suggests that the operators of the Adylkuzz campaign are using multiple command and control servers to manage infected systems and to download cryptominer binaries and instructions for mining, Proofpoint said.

"WannaCry is a very noisy threat. You need to know it is there in order to get you to pay the ransom," says Brian Vecci, technical evangelist at Varonis. "This is different and more dangerous. It does not want you to know it's there," he says.

What attacks like WannaCry and AdylKyzz highlight are just how bad the threat situation has become with the release of the NSA's weaponized exploits. In this case, adversaries used the NSA's EternalBlue and Double Pulsar tools to distribute ransomware and a crypto mining too. But they could use it just as easily to deliver other potentially more lethal payloads, he says.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.