Latest SMB Worm Is Out On The Loose and Uses 7 NSA Tools Exploits

Traffic Shaping, Technique that NSA uses to spy Americans

The Researchers have detected a new trojan horse this is spreading via SMB, but not like the malicious program additives of the WannaCry ransomware, this one is using 7 NSA tools rather than.

The malicious program’s existence on the internet first got here to light on Wednesday, after it infected the SMB honeypots of Miroslav Stampar, the member of the Croatian authorities CERT, and creator of the SQL map tool used for detecting and exploiting square injection flaw.

EternalRocks is more complicated but less risky

As a trojan horse, EternalRock is far much less dangerous than WannaCry’s trojan horse additives, because it presently does no longer supply any malicious content. This, however, does now not mean that EternalRocks is less complicated. in step with Stamper, it’s genuinely the opposite.

For starters, EternalRocks is a long way more sneaky than WannaCry’s SMB malicious program factor. as soon as it infects victims, the computer virus uses a -level set up the process, with a delayed 2d level.

All through the primary stage, EternalRocks benefit a foothold on an inflamed host, downloads the Tor consumer, and beacons its C&C server, placed on a .onion area, the dark net.

No kill switch domains

Moreover, EternalRocks additionally makes use of files with the equal call to the ones utilized by WannaCry’s SMB computer virus, in any other attempt to idiot safety researchers into misclassifying it.

But not like WannaCry, EternalRocks does no longer consist of a kill switch domain names, the Achille’s heel that protection researchers used to forestall the WannaCry outbreak.

After the preliminary dormancy length expires and the C&C server responds, EternalRocks goes into the second one stage of its installation system process and downloads a 2nd-degree malware aspect within the shape of an archive named

EternalRocks could be weaponized in an on the spot

Because of its broader exploit arsenals, the shortage of a kill switch area, and because of its preliminary dormancy, EternalRocks may want to pose a critical danger to laptop with inclined SMB ports exposed to the internet, if its writer could ever decide to weaponize the worms with ransomware, a banking trojan, RATs, or something else.

Before everything glance, the computer virus seems to be an experiment, or a malware creator acting exams and fine-tuning future threats.

This, however, does now not mean EternalRocks is innocent. laptop infected with this worm are controllable through C&C server command and the worm’s proprietor could leverage this hidden communications channel to ship new malware to the computer systems previously infected by using EternalRocks.
Moreover, DOUBLEPULSAR, an NSA tools implants with backdoor functions, remains jogging on desktops infected with EternalRocks. sadly, the trojan horse’s authors have no longer taken any degree to guard the DOUBLEPULSAR implants, which runs in a default unprotected nation, that means other risk factors may want to use it as a backdoor to machines infected by way of EternalRocks, by way of sending their very own malware to those computers.

IOCs and extra data on the computer virus’s contamination manner are available in a GitHub repo Stamper installation some days ago.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.