Security researchers discover malware that infected 90,000 computers worldwide

Agencies
October 8, 2019

Security researchers have discovered that the Smominru malware infected 90,000 machines worldwide during the month of August, with an infection rate of up to 4,700 computers per day.

In its post-infection phase, it steals victim credentials, installs a Trojan module and a cryptominer and propagates inside the network, according to researchers from Guardicore, a data centre and cloud security company.

The botnet uses several methods to propagate, but primarily it infects a system in one of two ways -- either by brute-forcing weak credentials for different Windows services, or more commonly by relying on the infamous EternalBlue exploit, cybersecurity firm Kaspersky said in a blog post last week.

Even though Microsoft patched the vulnerability EternalBlue exploits, which made the WannaCry and NotPetya outbreaks possible, many companies are simply ignoring updates, Kaspersky said.

China, Taiwan, Russia, Brazil and the US have seen the most attacks, but that doesn't mean other countries are out of its scope. For example, the largest network Smominru targeted was in Italy, with 65 hosts infected.

The criminals involved are not too particular about their targets, which range from universities to healthcare providers.

However, one detail is very consistent. About 85 per cent of infections occur on Windows 7 and Windows Server 2008 systems. The rest include Windows Server 2012, Windows XP and Windows Server 2003.

After compromising the system, Smominru creates a new user, called admin$, with admin privileges on the system and starts to download a whole bunch of malicious payloads.

The most obvious objective is to silently use infected computers for mining cryptocurrency (namely, Monero) at the victim's expense.

The malware also downloads a set of modules used for spying, data exfiltration, and credential theft.

On top of that, once Smominru gains a foothold, it tries to propagate further within the network to infect as many systems as possible.

To protect their network, computers, and data from Smominru, users need to update operating systems and other software regularly, Kaspersky said.

It is also important for users to use strong passwords. A reliable password manager that helps you create, manage, and automatically retrieve and enter passwords may help protect you against brute-force attacks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 2,2020

Leiden, Jul 2: Astronomers have discovered a luminous galaxy caught in the act of reionizing its surrounding gas only 800 million years after the Big Bang.

The research, led by Romain Meyer, PhD student at UCL in London, UK, has been presented at the virtual annual meeting of the European Astronomical Society (EAS).

Studying the first galaxies that formed 13 billion years ago is essential to understanding our cosmic origins. One of the current hot topics in extragalactic astronomy is 'cosmic reionization,' the process in which the intergalactic gas was ionized (atoms stripped of their electrons).

Cosmic reionization is similar to an unsolved murder: We have clear evidence for it, but who did it, how and when? We now have strong evidence that hydrogen reionization was completed about 13 billion years ago, in the first billion years of the universe, with bubbles of ionized gas slowly growing and overlapping.

The objects capable of creating such ionized hydrogen bubbles have however remained mysterious until now: the discovery of a luminous galaxy in which 60-100 percent of ionizing photons escape, is likely responsible for ionizing its local bubble. This suggests the case is closer to being solved.

The two main suspects for cosmic reionization are usually 1) a population of numerous faint galaxies leaking ~10 percent of their energetic photons, and 2) an 'oligarchy' of luminous galaxies with a much larger percentage (>50 percent) of photons escaping each galaxy.

In either case, these first galaxies were very different from those today: galaxies in the local universe are very inefficient leakers, with only <2-3 percent of ionizing photons escaping their host. To understand which galaxies governed cosmic reionization, astronomers must measure the so-called escape fractions of galaxies in the reionization era.

The detection of light from excited hydrogen atoms (the so-called Lyman-alpha line) can be used to infer the fraction of escaping photons. On the one hand, such detections are rare because reionization-era galaxies are surrounded by neutral gas which absorbs that signature hydrogen emission.

On the other hand, if this hydrogen signal is detected it represents a 'smoking gun' for a large ionized bubble, meaning we have caught a galaxy reionizing its surroundings. The size of the bubble and the galaxy's luminosity determines whether it is solely responsible for creating this ionized bubble or if unseen accomplices are necessary.

The discovery of a luminous galaxy 800 million years after the Big Bang supports the scenario where an 'oligarchy' of bright leakers emits most of the ionizing photons.

"It is the first time we can point to an object responsible for creating an ionized bubble, without the need for a contribution from unseen galaxies.

Additional observations with the upcoming James Webb Space Telescope will enable us to study further what is likely one of the best suspects for the unsolved case of cosmic reionization," said Meyer.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 7,2020

New Delhi, Jun 7: The Government of India (GoI) must strengthen the laws to protect animals, said People for the Ethical Treatment of Animals (PETA) India CEO Dr Manilal Valliyate on Sunday, following an elephant's death in Kerala and cow injured due to ingestion of explosives in Himachal Pradesh.

"Such incidents are not just restricted to certain regions but are happening all across the country. PETA receives more than 100 similar cases every day. People send in their complaints to us, not just for cows and elephants but for so many other animals as well," he said.

The PETA chief urged the GoI to strengthen the laws established to protect animals.

"As per the current laws set out against animal cruelty, the perpetrator would only be charged Rs 50,000 as a fine. That is equivalent to no punishment at all," added PETA India CEO.

He expressed his anguish against municipal agencies as well, saying that they are not doing "serious" work. He also highlighted how cows are left on the roads to wander, after milking them, to feed on garbage, in several parts of the country.

"These injustices against animals through explosives has been going on for quite a while. But for the first time, it has received such public attention," he said.

After a pregnant elephant was fed cracker-filled pineapple and her eventual death on May 27 in Kerala's Palakkad district, a pregnant cow sustained fatal injuries on May 25 due to accidental ingestion of explosives in Dadh village of Bilaspur district of Himachal Pradesh.

One person has been arrested in the Dadh village for allegedly hurting the cow.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 11,2020

Citing the current dismal aviation scenario, Air India is terminating the services of trainee cabin crew and cabin crew by withdrawing the offer of employment of those who were under training.

As per sources, the new crew and trainee pilots might reduce contracts from five years to one year. Sources said Air India is terminating 1,200 crew and employees who are more than 55-yr-old including 190 trainee pilots.

In a letter reviewed by IANS, Air India has informed an applicant who had been selected as cabin crew in August 2019 subject to successful completion of training.

"On behalf of Air India we would like to thank you for the interest shown by you in joining our organization. However, in view of the current aviation scenario, it would not be possible for Air India to impart any further training to you for engaging your services," the company said.

"In view of the above reasons, which are beyond the control of the company, it has been decided to discontinue your training arrangements and dispense with the offer of engagement with immediate effect. The bank guarantee furnished by you at the time of joining is returned herewith," Air India told the cabin crew.

"Once again on behalf of Air India we thank you for your cooperation and trust that you will appreciate the circumstances under which we are constrained to discontinue the training arrangements," the carrier said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.