Security researchers discover malware that infected 90,000 computers worldwide

Agencies
October 8, 2019

Security researchers have discovered that the Smominru malware infected 90,000 machines worldwide during the month of August, with an infection rate of up to 4,700 computers per day.

In its post-infection phase, it steals victim credentials, installs a Trojan module and a cryptominer and propagates inside the network, according to researchers from Guardicore, a data centre and cloud security company.

The botnet uses several methods to propagate, but primarily it infects a system in one of two ways -- either by brute-forcing weak credentials for different Windows services, or more commonly by relying on the infamous EternalBlue exploit, cybersecurity firm Kaspersky said in a blog post last week.

Even though Microsoft patched the vulnerability EternalBlue exploits, which made the WannaCry and NotPetya outbreaks possible, many companies are simply ignoring updates, Kaspersky said.

China, Taiwan, Russia, Brazil and the US have seen the most attacks, but that doesn't mean other countries are out of its scope. For example, the largest network Smominru targeted was in Italy, with 65 hosts infected.

The criminals involved are not too particular about their targets, which range from universities to healthcare providers.

However, one detail is very consistent. About 85 per cent of infections occur on Windows 7 and Windows Server 2008 systems. The rest include Windows Server 2012, Windows XP and Windows Server 2003.

After compromising the system, Smominru creates a new user, called admin$, with admin privileges on the system and starts to download a whole bunch of malicious payloads.

The most obvious objective is to silently use infected computers for mining cryptocurrency (namely, Monero) at the victim's expense.

The malware also downloads a set of modules used for spying, data exfiltration, and credential theft.

On top of that, once Smominru gains a foothold, it tries to propagate further within the network to infect as many systems as possible.

To protect their network, computers, and data from Smominru, users need to update operating systems and other software regularly, Kaspersky said.

It is also important for users to use strong passwords. A reliable password manager that helps you create, manage, and automatically retrieve and enter passwords may help protect you against brute-force attacks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 29,2020

New Delhi, Jun 29: Witnessing azure skies and breathable air for the last three months, Delhi on Monday recorded deterioration in its air quality, with particulate matter with diameter of 2.5 and 10 microns -- too small to be filtered out of the human body -- standing at 52 and 297 micrograms per cubic respectively.

Gufran Beig, Project Director of System of Air Quality Weather Forecasting and Research (SAFAR), said that the sudden spike in air pollution is due to a mild dust storm blowing from Rajasthan.

"Since the wind direction is changing and moist air is coming in, the air quality in Delhi will become better by tomorrow," Beig told IANS.

Central Pollution Control Board (CPCB) data showed that the overall air quality near Delhi Technical University (DTU) area stood at 326 micrograms per cubic, followed by 308 at Narela and 307 at Mundka.

Out of 36 stations, the AQI in as many as 30 stations was above 200 micrograms per cubic till 1 pm on Monday.

The System of Air Quality Weather Forecasting and Research categorises air quality in the 0-50 range as good, 51-100 as satisfactory, 101-200 as moderate, 201-300 as poor, 301-400 as very poor, and above 400 as severe.

According to SAFAR's website, "PM 10 (coarser dust particle) is the lead pollutant. AQI is likely to improve to moderate category by tomorrow, and further improvement is expected by July 1."

Researchers indicated that PM 10 and PM 2.5 will be 170 and 47 micrograms per cubic on Tuesday.

With no vehicles plying on the roads or industries shut due to the lockdown since March 25, Delhi's air quality had improved drastically.

According to a study conducted by the Indian Institute of Technology (IIT), Delhi, if the low levels of air pollution reached during the lockdown period are maintained, India's annual death toll could reduce by 6.5 lakh.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 22,2020

Chennai, Jun 22: Commuting the death sentence to life imprisonment for five convicts, the Madras High Court on Monday set free Chinnasamy, the main convict, who had also been sentenced to death in the Udumalpet Shankar honour killing case.

A Division Bench comprising Justice M. Sathyanarayanan and Justice M. Nirmal Kumar also dismissed the appeal by the state police against the acquittal of three persons by a lower court.

The Bench ordered the five convicts sentenced for life to undergo a jail term of not less than 25 years.

In 2016, V. Shankar, who had married C. Kausalya, was killed by a gang in Udumalpet in Tamil Nadu. The gang also injured Kausalya in the attack.

It was alleged the parents of Kausalya -- Chinnasamy, Annalakshmi -- were against the marriage.

P. Pandidurai, the uncle of Kausalya at the behest of Chinnasamy and Annalakshmi had hired a gang to kill Shankar.

The gang killed Shankar in broad daylight in a public place and Kausalya too got injured in the attack as she tried to save her husband.

The Principal District and Sessions Court in Tiruppur had convicted and sentenced to death six accused persons -- Chinnasamy, P. Jagadeesan, P. Selvakumar, M. Manikandan, M. Mathan alias Michael and P. Kalaithamilvaanan.

The court also sentenced two other accused, K. Dhanraj for life and Manikandan to a five year jail term, while acquitting Annalakshmi, Pandidurai and Prasanna.

The convicts had filed an appeal against their sentence in the Madras High Court while the police filed an appeal against the acquittal of three persons.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.