{"id":1185,"date":"2017-05-29T10:00:29","date_gmt":"2017-05-29T10:00:29","guid":{"rendered":"http:\/\/www.gtechbooster.com\/?p=1185"},"modified":"2026-01-03T15:31:50","modified_gmt":"2026-01-03T15:31:50","slug":"new-malware-in-the-shadows-uses-7-leaked-exploits","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/new-malware-in-the-shadows-uses-7-leaked-exploits\/","title":{"rendered":"New malware in the Shadows uses 7 leaked exploits"},"content":{"rendered":"\n<p>A security researcher has identified a new strain of malware that  also spreads itself by exploiting flaws in Windows SMB file sharing  protocol, but unlike the WannaCry Ransomware that uses only two leaked  NSA hacking tools, it exploits all the seven.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2 gtech-entity-placement\" style=\"text-align: center;\" id=\"gtech-4026054041\"><div id=\"gtech-356978339\" style=\"margin-right: auto;margin-left: auto;text-align: center;\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>Last week, we warned you about multiple hacking groups exploiting leaked  NSA hacking tools, but almost all of them were making use of only two  tools: EternalBlue and DoublePulsar.<\/p>\n\n\n\n<p>Now, Miroslav Stampar, a security researcher who created famous \u2018sqlmap\u2019  tool and now a member of the Croatian Government CERT, has discovered a  new network worm, dubbed <strong>EternalRocks<\/strong>, which is more dangerous than WannaCry and has no kill-switch in it. Unlike WannaCry, <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/stamparm\/EternalRocks\/\" target=\"_blank\">EternalRocks<\/a> seems to be designed to function secretly in order to ensure that it remains undetectable on the affected system.<\/p>\n\n\n\n<p>However, Stampar learned of EternalRocks after it infected his <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/stamparm\/status\/864865144748298242\" target=\"_blank\">SMB honeypot<\/a>.<\/p>\n\n\n\n<p>The NSA exploits used by EternalRocks, which Stampar called \u201c<strong>DoomsDayWorm<\/strong>\u201d on <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/stamparm\/status\/865020182829432832\" target=\"_blank\">Twitter<\/a>, includes: <\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>EternalBlue \u2014 SMBv1 exploit tool<\/li>\n\n\n\n<li>EternalRomance \u2014 SMBv1 exploit tool<\/li>\n\n\n\n<li>EternalChampion \u2014 SMBv2 exploit tool<\/li>\n\n\n\n<li>EternalSynergy \u2014 SMBv3 exploit tool<\/li>\n\n\n\n<li>SMBTouch \u2014 SMB reconnaissance tool<\/li>\n\n\n\n<li>ArchTouch \u2014 SMB reconnaissance tool<\/li>\n\n\n\n<li>DoublePulsar \u2014 Backdoor Trojan<\/li>\n<\/ol>\n\n\n\n<p><strong>Also Read:<\/strong>&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/www.gtechbooster.com\/hackers-malware-in-subtitle-files\/\" target=\"_blank\">Hackers malware in subtitle files<\/a><br> Whereas EternalBlue, EternalChampion, EternalSynergy and EternalRomance  are SMB exploits, designed to compromise vulnerable Windows computers.<\/p><div class=\"gtech-mid-cont gtech-entity-placement\" style=\"text-align: center;\" id=\"gtech-174393155\"><div id=\"gtech-2319693145\" style=\"margin-right: auto;margin-left: auto;text-align: center;\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>\n\n\n\n<p>And, DoublePulsar is then used to spread the worm from one affected  computers to the other vulnerable machines across the same network. Stampar <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/stamparm\/status\/865083810194608128\" target=\"_blank\">found<\/a>  that EternalRocks disguises itself as WannaCry to fool security  researchers, but instead of dropping ransomware, it gains unauthorized  control on the affected computer to launch future cyber attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Here\u2019s How EternalRocks Attack Works:<\/h3>\n\n\n\n<p>EternalRocks installation takes place in a two-stage process. During the first stage, EternalRocks downloads the Tor web browser on  the affected computers, which is then used to connect to its  command-and-control (C&amp;C) server located on the Tor network on the  Dark Web.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cFirst stage malware UpdateInstaller.exe (got through <br>remote exploitation with second stage malware) downloads necessary .NET <br>components (for later stages) TaskScheduler and SharpZLib from the <br>Internet, while dropping svchost.exe (e.g. sample) and taskhost.exe <br>(e.g. sample),\u201d Stampar\u00a0<a href=\"https:\/\/github.com\/stamparm\/EternalRocks\/\" target=\"_blank\" rel=\"noreferrer noopener\">says<\/a>.<\/p>\n<cite> Stampar&nbsp; <\/cite><\/blockquote>\n\n\n\n<p>According to Stampar, the <a href=\"https:\/\/twitter.com\/stamparm\/status\/865007344630996992\" target=\"_blank\" rel=\"noreferrer noopener\">second stage<\/a> comes with a delay of 24 hours in an attempt to avoid sandboxing techniques, making the worm infection undetectable.<br>\nAfter 24 hours, EternalRocks responds to the C&amp;C server with an \narchive containing the seven Windows SMB exploits mentioned above.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cComponent svchost.exe is used for <br>downloading, unpacking and running Tor from archive.torproject.org along<br> with C&amp;C (ubgdgno5eswkhmpy.onion) communication requesting further <br>instructions (e.g. installation of new components),\u201d Stampar adds.<\/p>\n<\/blockquote>\n\n\n\n<p>All the seven SMB exploits are then downloaded to the infected  computer. EternalRocks then scans the internet for open SMB ports to  spread itself to other vulnerable systems as well. If you are following The Hacker News coverage on WannaCry Ransomware and  the Shadow Brokers leaks, you must be aware of the hacking collective\u2019s  new announcement of releasing new zero-days and exploits for web  browsers, smartphones, routers, and Windows operating system, including  Windows 10, from next month.<\/p>\n\n\n\n<p>The exclusive access to the upcoming leaks of zero-days and exploits  would be given to those buying subscription for its \u2018Wine of Month  Club.\u2019 However, the Shadow Brokers has not yet announced the price for  the subscription.<\/p>\n\n\n\n<p class=\"cls has-palette-color-14-color has-palette-color-1-background-color has-text-color has-background has-link-color wp-elements-943268a056cc4fb171e8cbcb375a2537\">Since the hackers and state-sponsored attackers are currently waiting  for new zero-days to exploit, there is very little you can do to protect  yourself from the upcoming cyber attacks. <\/p>\n<div class=\"gtech-end-cont gtech-entity-placement\" id=\"gtech-1045266829\"><div id=\"gtech-470958264\" style=\"margin-right: auto;margin-left: auto;text-align: center;\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>A security researcher has identified a new strain of malware that also spreads itself by exploiting flaws in Windows SMB file sharing protocol, but unlike the WannaCry Ransomware that uses only two leaked NSA hacking tools, it exploits all the seven.<\/p>\n","protected":false},"author":7,"featured_media":1290,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_gspb_post_css":"","footnotes":""},"categories":[1915],"tags":[1444,236,530,457,981,606,663,678,864,1494],"class_list":["post-1185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-cyber-security","tag-data-security","tag-malware","tag-network","tag-network-security","tag-nsa","tag-privacy","tag-ransomware","tag-wannacry-ransomware-attack","tag-web-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/1185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=1185"}],"version-history":[{"count":1,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/1185\/revisions"}],"predecessor-version":[{"id":78274,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/1185\/revisions\/78274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/1290"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=1185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=1185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=1185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}