Cisco Blog >Threat Research

Threat Research

When the WannaCry attack was launched a little over a week ago, it was one of the first large scale attacks leveraging the data that was leaked by the Shadow Brokers. At the time the real concern was how quickly we would begin to see other threats leverage the same vulnerabilities. Over the past couple of weeks, Talos has observed other malware variants that are using the ETERNALBLUE and DOUBLEPULSAR exploits from the Shadow Brokers release as part of their campaigns. Among them were Adylkuzz, Uiwix, and EternalRocks.

Adylkuzz is a piece of malware that uses ETERNALBLUE and DOUBLEPULSAR to install cryptocurrency mining software on the infected system. This attack actually pre-dates the WannaCry attack and has continued to deliver the cryptocurrency miner.

Uiwix uses a similar technique to install ransomware on the infected system. When the files are encrypted, the file names include 'UIWIX' as part of the file extension. The key difference with this malware is that, unlike WannaCry, the Ransomware doesn't 'worm itself.' It only installs itself on the system.

Read more »

Tags:

Cisco Systems Inc. published this content on 22 May 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 22 May 2017 22:27:11 UTC.

Original documenthttps://blogs.cisco.com/security/talos/adylkuzz-uiwix-eternalrocks

Public permalinkhttp://www.publicnow.com/view/F043859854C508829A924CD3568473AB8F8F1F4D