Le Lézard
Classified in: Health, Science and technology, Business
Subject: SCIENCE AND TECHNOLOGY

Secdo discovers WannaCry attackers exploited NSA's ETERNALBLUE weeks earlier to steal login credentials


NEW YORK, NY--(Marketwired - May 19, 2017) - Secdo, provider of automated incident response solutions, this week discovered evidence that sophisticated actors leveraged the National Security Agency's (NSA) ETERNALBLUE several weeks before the outbreak of WannaCry to attack organizations, installing backdoors and exfiltrating user credentials in networks around the world. The WannaCry ransomware was just one variant.

Secdo made the discovery in the wake of reports during April by multiple customers, including publicly traded companies, that reported being attacked by an undetectable ransomware on their endpoints. Having recorded every action on those endpoints and servers at the thread level allowed Secdo to play-back, analyze and identify these attacks. The company believes many organizations may continue to be vulnerable to thread-level attacks that install backdoors, exfiltrate data and steal credentials.

Jake Williams, founder of Rendition Infosec and a SANS Institute instructor, scanned the internet for weeks looking for active infections of DoublePulsar, the backdoor implant tool used alongside ETERNALBLUE in the WannaCry ransomware attack. "Finding a machine with DoublePulsar running indicates that the same vulnerability used in the WannaCry malware was used to compromise Windows machines much earlier," said Williams. "Although the numbers have varied widely, ranging from 25,000-150,000 active infections, it is clear that attackers have been exploiting this vulnerability almost since the day it was released by Shadow Brokers."

Upon gaining entry to Windows-based machines, the attack utilized the NSA's DoublePulsar to spawn a thread within a legitimate system process, allowing it to remain undetected by most detection systems that are unable to collect activities at the thread level.

"WannaCry is merely a visible symptom and not the underlying cause," said Secdo's CTO, Gil Barak. "Multiple threat actors were exploiting ETERNALBLUE to infect endpoints weeks prior to the WannaCry outbreak. Even if your organization successfully blocked or was not attacked by WannaCry, you may still be compromised."

Barak continued, "The attackers had more than a month to breach organizations, install backdoors, steal information and cause other damage, which most organizations may still not be able to discover -- until it's too late. Installing the Microsoft patch is critical for protection from future attacks exploiting Windows SMB, but it does not remediate machines that have already been compromised."

To discover if the breach is still present, organizations should look for thread-based behavioral IOCs that indicate compromise from at least early April. In addition, organizations need to attain continuous visibility at the thread level into every endpoint in the network to hunt and respond effectively to thread-based attacks in the future.

ABOUT SECDO

Secdo is the first and only preemptive incident response solution, automating the IR process and slashing incident response time to seconds. Gain unmatched historical thread-level endpoint visibility, automatically investigate any alert and visualize the forensic timeline and attack chain back to the root cause. Then, rapidly and surgically respond and remediate on any endpoint or server without impacting business productivity. Follow us on Twitter at @secdocyber, and on LinkedIn.

Image Available: http://www.marketwire.com/library/MwGo/2017/5/19/11G139294/Images/1_Initial_ETERNALBLUE_compromise-9a25547c44d1afdcbb72a556624dba6a.jpg
Image Available: http://www.marketwire.com/library/MwGo/2017/5/19/11G139294/Images/2_ETERNALBLUE_infects_other_devices_spawns_stealth-ccb0946813999afbb340b387fb496f7d.jpg
Image Available: http://www.marketwire.com/library/MwGo/2017/5/19/11G139294/Images/3_Malicious_thread_inside_legitimate_process-59ee6dd7f0c592b39456517cee7fec11.jpg


These press releases may also interest you

at 04:00
ITO EN, Ltd., the Tokyo-based producer of the world's No. 1 unsweetened green tea beverage brand "Oi Ocha" (*), has signed a global contract with Shohei Ohtani, the Los Angeles Dodgers player. The company is pleased to announce his appointment as ITO...

at 04:00
The9 Limited ("The9"), an established Internet company, today announced that it signed a definitive share purchase agreement (the "Agreement") with Kuaijin Shidai (Xiamen) Technology Co., Ltd. ("KuaiJin"), a company operating unmanned retail store...

at 04:00
Results of the 24th annual North American Automotive OEM - Supplier Working Relations Index® (WRI®) Study that evaluates relations between US automakers and their suppliers were released today by Plante Moran. Do...

at 04:00
ATRenew Inc. ("ATRenew" or the "Company") , a leading technology-driven pre-owned consumer electronics transactions and services platform in China, today announced its unaudited financial results for the three months ended March 31, 2024.  First...

at 03:40
HTA Group, Ltd (the "Offeror"), an indirect wholly owned subsidiary of Helios Towers plc (the "Company"), announces the launch of its offer to purchase for cash any and all of the 7.000% Senior...

at 03:20
In a grand ceremony held on Wednesday in the Russian Embassy in Beijing, two sculptures portraying the renowned Russian novelist Maxim Gorky (1868-1936) and his Chinese counterpart Lu Xun (1881-1936), who was the most influential representative of...



News published on and distributed by: