Cyber Security News (2nd February 2018)

  1. Cryptocurrency Mining Malware Infected Over Half-Million PCs Using NSA Exploit

2017 was the year of high profile data breaches and ransomware attacks, but from the beginning of this year becoming a popular and profitable choice for cyber criminals. According to the latest report, Several cybersecurity firms are reporting of new cryptocurrency mining viruses that are being spread using EternalBlue—the same NSA exploit that was leaked by the hacking group Shadow Brokers and responsible for the devastating widespread ransomware threat WannaCry. The researcher said that hackers are using EternalBlue SMB exploit (CVE-2017-0144) to infect Windows computers to secretly mine Monero cryptocurrency, worth millions of dollars, for its master. The security firm CrowdStrike recently published a blog post, reporting another widespread cryptocurrency fileless malware, dubbed WannaMine, using EternalBlue exploit to infect computers to mine Monero cryptocurrency. The researcher also said that it is very difficult to detect such malware by antivirus programs.

Cyber Security Tips:  Users are strongly recommended that check before downloading your files, keep your systems up-to-date, keep using reputed antivirus, avoid opening a spam email, keep your system protected with a strong password and beware of phishing attacks.

  1. Meltdown/Specter-based Malware Coming Soon to Devices near You, Are You Ready?

In the month of January the Spectre, and Meltdown processor vulnerabilities came out in public and researchers have discovered more than 130 malware samples trying to exploit these chip flaws. Spectre and Meltdown are security vulnerabilities disclosed by security researchers earlier this month in many processors from Intel, ARM, and AMD used in modern PCs, servers, and smartphones, among other devices which could enable attackers to bypass memory isolation mechanisms and access everything, including memory allocated for the kernel containing sensitive data like passwords, encryption keys and other private information. Cybersecurity firm Fortinet also tracked and analyzed many malware samples ‘trying to exploit’ this vulnerability.

Cyber Security Tips:  Users administrators are strongly recommended that apply patches which were released in last month.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: