fileless wannamine cryptojacking malware using nsa exploit

14
3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 1/14 Monday, March 5, 2018 Droopescan – Plugin Based CMS Security Scanner Grab your copy here Download Hackers Handbook 2017 News Fileless WannaMine Cryptojacking Malware Using NSA Exploit February 5, 2018 haxf4rall2017 0 Comments Fileless WannaMine Cryptojacking Malware Using NSA Exploit, wannamine tool, wannamine tutorial Forget WannaCry and welcome WannaMine, a leless cryptojacking malware using leaked NSA exploit called EternalBlue. We cannot ignore the fact that cryptocurrencies are much in demand and monetary worth of digital currencies like Bitcoin, Ethereum, Litecoin, and Monero have soared tremendously, thereby, increasing the purchasing power and liquidity of cryptocurrency wallets. Follow Us Advertisements Report this ad Latest: Be the first of your friends to like this HAXF4RALL 8K likes Like Page

Upload: others

Post on 20-May-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 1/14

Monday, March 5, 2018 Droopescan – Plugin Based CMS Security Scanner

Grab your copy here

Download Hackers Handbook 2017

News  

Fileless WannaMine CryptojackingMalware Using NSA Exploit February 5, 2018 haxf4rall2017 0 Comments Fileless WannaMine

Cryptojacking Malware Using NSA Exploit, wannamine tool, wannamine tutorial

Forget WannaCry and welcome WannaMine, a �leless cryptojackingmalware using leaked NSA exploit called EternalBlue.

We cannot ignore the fact that cryptocurrencies are much in demand andmonetary worth of digital currencies like Bitcoin, Ethereum, Litecoin, andMonero have soared tremendously, thereby, increasing the purchasingpower and liquidity of cryptocurrency wallets.

Follow Us

Advertisements

Report this ad

Latest:

Be the first of your friends to like this

HAXF4RALL8K likes

Like Page

Page 2: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 2/14

In such a time, cybercriminals were expected to make use of the utterlypro�table nature of cryptocurrencies and to do this, they have come upwith an extremely productive process known as mining. Throughcryptocurrency mining, they can drain energies from even the mostpowerful computer systems.

Whats more disturbing is that now cybercriminals have come up withcryptojacking malware that is solely created to suck the CPU power fromcomputers. One such cryptojacking malware is WannaMine. It uses leakedhacking tools of the NSA (National Security Agency) to gain access tocomputers and drain o� processor power to carry out mining.

Here, we must recall the NSA’s Windows exploit known as EternalBlue thatwas leaked in April 2017 by hacking group Shadow Brokers and was laterused to launch the disastrous WannaCry ransomware that caused havocworldwide and locked down NHS systems. WannaCry ransomwaremanaged to infect around 230,000 computers in nearly 150 countries onlyto pave the way for another highly dangerous ransomware NotPetya. Thesame exploit is being used again to carry out Bitcoin and Monero miningusing cryptojacking malware WanaMine.

WannaMine was identi�ed by cybersecurity �rm Panda in October 2017while the malware was mining Monero after hijacking CPU cycles on thetargeted computer. Another cybersecurity �rm CrowdStrike stated thatthey have observed an increment in the distribution rate of WannaMinemalware as infections caused by this malicious software have doubled inlast few months. In fact, it crippled the operations of various companies fordays and weeks and used the resources of their CPUs for Monero mining.

WannaMine is a �leless malware that utilizes advanced tactics andtechniques to “maintain persistence within a network and move laterallyfrom system to system. WannaMine uses credentials acquired with thecredential harvester Mimikatz to attempt to propagate and move laterallywith legitimate credentials.” wrote CrowdStrike security researchers.

Hackers are using a wide range of techniques to infect computers fromemail phishing attacks to remote access hack. Using Mimikatz means thatthe machines patched against the notorious EternalBlue exploit previouslywon’t be able to tolerate this malware too. “If unsuccessful, WannaMineattempts to exploit the remote system with the EternalBlue exploit,” readthe blog post by CrowdStrike researchers.

WannaMine uses built-in Windows components like WindowsManagement Instrumentation (WMI) and PowerShell to perform itsmalicious tasks. Since it is a �leless malware, hence, it becomes quite

100 working deep web,onion and dark weblinks

How to kick playersO�ine on PS4 / XboxOne

Huge Collection of DeepWeb Onion Links

Embed View on Twitter

Tweets by @haxf4rall

3h

Sn1per – Automated Pentest Recon Scanner haxf4rall.com/2018/03/05/sn1…

Haxf4rall@haxf4rall

Haxf4rall@haxf4rall

Popular Posts

Advertisements

HOME NEWS HACK TOOLS HOW TO BECOME A HACKER SUBMIT A TOOL

Page 3: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 3/14

di�cult to detect it or stop it from harming the computers. Although it isn’tthe �rst ever �leless malware it is indeed quite sophisticated incomparison to other malware like Adyllkuzz that require downloading ofan application called CPUMiner to operate.

It is worth noting that WannaMine malware isn’t as dangerous as NotPetyaor WannaCry were because it does not lock the computers but it doesdrain o� 100% of the IT environment capability of a client by excessivelyusing the CPUs, which is concerning for �rms running data centers orserver farms.

While for individual users it would mean that their PCs or laptops’performance will deteriorate considerably. To protect your computers, it isimportant to enhance anti-virus security and install cybersecurity tools toensure endpoint protection and mitigate WannaMine threat.

Share this:

Top 25+ Best RainMeterSkins for Windows10/8.1/7 (2017)

Free Burp Suite HackingCourse – Web HackingTool

Fappening 3.0continues - PrivatePhotos of NicoleScherzinger, DakotaJohnson and AddisonTimlin

CEH v9 – Certi�edEthical Hacker v9Course PDF + ToolsDOWNLOAD

How to Bypass SMSVeri�cation of anyWebsite/Service

Freebitco.in script toEarn Free Bitcoin

Hackers Handbook2017

Submit a Tool

Tricks & How To's

Advertisements

Report this ad

Report this ad

Page 4: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 4/14

← KeyBox – Open-source Web-based SSH Console

Hacking Germany – Computers, Cyber Attacks and The Future(Documentary Film) →

You Are BeingSpied: Blame YourBeloved Apps September 20, 2015 0 Vault 8 – Cia Leaks

Project HiveSource Code November 10, 2017 0

The VigilanteHacker thathacked HackingTeam April 21, 2016 1

You May Also Like

Leave a Reply

Your email address will not be published. Required �elds are marked *

Tricks & How To's  

OperatingSystems can bedetected usingPing Command February 24, 2018 haxf4rall2017 0

Ping is a computer networkadministration softwareutility, which used to �ndthe Availability of a host onan Internet

Share this:

13

Like this:

Like

Be the first to like this.

Related

Shadow Brokers LeaksAnother WindowsHacking Tool from NSA

WikiLeaks Reveals'AfterMidnight' &'Assassin' CIA WindowsMalware Frameworks

5 Easy Ways To BlockCryptocurrency MiningIn Your Web Browser

September 8, 2017In "News" May 15, 2017

In "News"

September 26, 2017In "Tricks & How To's"

Advertisements

7

Page 5: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 5/14

Comment

Name *

Email *

Website

Post Comment

Notify me of follow-up comments by email.

Notify me of new posts by email.

BuildYourOwnIPsecVPN

Server: Auto Setup Scripts February 13, 2018 0

How toAccessFacebook FullSite

Desktop version onAndroid/iPhone Mobilebrowser January 13, 2018 0

Freebitco.inscript toEarnFree

Bitcoin December 9, 2017 4

35+UniqueRainmeter Skins

December 8, 2017 1

Microsoft Toolkit– All inoneWindow

s and O�ce Activator[Download] November 28, 2017 0

SSH Tricks for Hackers

Like this:

Like

Be the first to like this.

Page 6: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 6/14

November

21, 2017

0

Hackers Handbook2017

Grab your copy here

Social Media Hacking

Advertisements

Report this ad

Page 7: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 7/14

Social Media Hacking  

SocialFish –Phishing Toolwith Ngrokintegrated February 7, 2018 haxf4rall2017 0

Social�sh uses ngrok tosecure the phishing URL toyour localhost.Advertisements Related

Advertisements

Page 8: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 8/14

Share this:

TeleShadow –TelegramDesktop

Session Stealer October 4, 2017 0

UsingBeEF toHackFacebook

Credentials June 20, 2017 0

How tomakeFakeConversations

on Popular Messenger Apps May 16, 2017 0

Bt2 –BlazeTelegramBackdoo

r Toolkit June 7, 2016 0

Courses & Ebooks

10

Like this:

Loading...

Page 9: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 9/14

Courses & Ebooks  

Free Burp SuiteHacking Course –Web Hacking Tool March 4, 2018 haxf4rall2017 0

This course will help you tomaster Burp Suite. If youare doing or wanting to dopenetration testing, then

Advertisements

Page 10: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 10/14

Share this:

FreePenetrationTestingCourse

February 12, 2018 0

EthicalHacking& CyberSecurityCourse :

A Complete Package (FREE) January 9, 2018 1

KaliLinuxHackingeBooksDownloa

d in PDF 2017 November 28, 2017 1

TheHackerPlaybook:Practical

Guide To PenetrationTesting November 26, 2017 0

13

Like this:

Loading...

Page 11: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 11/14

Documentaries

Documentary  

Hacking Germany– Computers,Cyber Attacksand The Future(DocumentaryFilm) February 6, 2018 haxf4rall2017 0

Cyber attacks are commonand show how vulnerableour digitally interconnectedlives have become.Advertisements Related

Advertisements

Page 13: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 13/14

January

29, 2018

0

NakedCitizensDocumentary January

28, 2018 0

Free theNetwork–HackersTake

Back the Web(Documentary Film) December 9, 2017 0

About Us

Haxf4rall is a collective, a good starting pointand provides a variety of quality material forcyber security professionals.

Useful Links

Contact Us

Disclaimer

Privacy Policy

Submit a Tool

Categories

Coding

Documentary

Courses & Ebooks

Hack Tools

Hacking Tutorials

Join OurCommunity!

Get the latest Newsand Hacking Toolsdelivered to yourinbox.

Advertisements

Page 14: Fileless WannaMine Cryptojacking Malware Using NSA Exploit

3/5/2018 Fileless WannaMine Cryptojacking Malware Using NSA Exploit – Haxf4rall

https://haxf4rall.com/2018/02/05/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/ 14/14

ActiveMembers

Mobile Hacking

News

Opensource

Operating Systems

TOR

Tricks & How To’s

Email

Don't Worry ! You willnot be spammed

Subscribe

Copyright © 2018 Haxf4rall. All rights reserved. Theme: ColorMag by ThemeGrill. Powered by WordPress.

Advertisements