The Latest in IT Security

Cyptojacking Attacks Target Enterprises With NSA-Linked Exploits


Dubbed Beapy, the campaign aims to drop a file-based coinminer onto compromised machines, to hijack their computing power for the attackers’ benefit. First observed in January 2019, the activity has been increasing since March, the security firm says.

Written in Python, the coinminer uses email as an initial infection vector, but also leverages the EternalBlue exploit and stolen and hardcoded credentials to spread to other machines on the compromised environment. This wormlike behavior suggests that the malware was probably always intended to target enterprises.

Beapy is mostly focused on enterprises in Asia, with over 80% of its victims located in China. Others are located in South Korea, Japan, Hong Kong, Taiwan, the United States, the Philippines, Vietnam, and elsewhere.

Read More

Leave a reply


SUNDAY, JULY 05, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments