Technology
BlueKeep mass attacking vulnerable machines
San Francisco, Nov 4
The "BlueKeep" remote code execution vulnerability, which could have an effect similar to the WannaCry bug from 2017, is currently attacking vulnerable machines that are apparently compromised for cryptocurrency mining purposes, according to media reports.
The BlueKeep vulnerability exists in unpatched versions of Windows Server 2003, Windows XP, Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2.
According to security researcher Kevin Beaumont, several honeypots in his EternalPot RDP honeypot network started to crash and reboot.
They've been active for almost half a year and this is the first time they came down. For some reason, the machines in Australia did not crash, the researcher said in a tweet, Bleeping Computer reported on Sunday.
Security researchers, including Beaumont who originally named the vulnerability and Marcus Hutchins, also known as "MalwareTech", who was responsible for hitting the kill switch that stopped the WannaCry bug, have confirmed that a widespread BlueKeep exploit attack is now currently underway.
Hutchins was quoted as saying by the Wired that "BlueKeep has been out there for a while now. But this is the first instance where I've seen it being used on a mass scale."
Interestingly, BlueeKeep has the ability to spread itself from one machine to another, while the attackers are searching for vulnerable unpatched Windows systems that have Remote Desktop Services (RDP) 3389 ports exposed to the Internet.
For now though, this looks like being an attack campaign with a cryptocurrency miner payload, according to Forbes.
The BlueKeep vulnerability exists in unpatched versions of Windows Server 2003, Windows XP, Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2.
According to security researcher Kevin Beaumont, several honeypots in his EternalPot RDP honeypot network started to crash and reboot.
They've been active for almost half a year and this is the first time they came down. For some reason, the machines in Australia did not crash, the researcher said in a tweet, Bleeping Computer reported on Sunday.
Security researchers, including Beaumont who originally named the vulnerability and Marcus Hutchins, also known as "MalwareTech", who was responsible for hitting the kill switch that stopped the WannaCry bug, have confirmed that a widespread BlueKeep exploit attack is now currently underway.
Hutchins was quoted as saying by the Wired that "BlueKeep has been out there for a while now. But this is the first instance where I've seen it being used on a mass scale."
Interestingly, BlueeKeep has the ability to spread itself from one machine to another, while the attackers are searching for vulnerable unpatched Windows systems that have Remote Desktop Services (RDP) 3389 ports exposed to the Internet.
For now though, this looks like being an attack campaign with a cryptocurrency miner payload, according to Forbes.
12 hours ago
Jeffrey Sachs warns: "Dubai could be blown up if UAE enters war"
12 hours ago
Book 'Hyderabad Days' by Microsoft executive traces roots of leadership
12 hours ago
US-based fundraiser raises $200,000 to empower one lakh Indians with disabilities
12 hours ago
India, African nations hold talks on bolstering trade and investment ties
12 hours ago
US shutdown standoff hits airports, DHS funding stuck
20 hours ago
Iran claims heavy US causalities in strikes on 'hideouts' in Dubai
20 hours ago
ggjey1 Attachments Sat, Mar 28, 10:57 PM (14 hours ago) to me, Paul "US accomplished most of its targets in "Iran, to continue operations briefly": JD Vance
20 hours ago
Cuba slams US for 'lying' over fuel blockade
20 hours ago
US deploys 3,500 marine troops to Middle East amid war against Iran
20 hours ago
Israeli military says strikes on vital components of Iran's military industry to be completed within days
20 hours ago
Pentagon prepares for weeks of ground operations in Iran: US media
20 hours ago
'No kings' protests sweep US against Trump policies
20 hours ago
Nomination filing begins tomorrow for TN Assembly polls; tight schedule amid holidays
