<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/WildFire%20Locker/Adylkuzz/Monero%20logo.png" alt="Monero logo.png" width="448" height="236"> <p>In May 2017, the <a href="https://blog.threatstop.com/this-past-weekend-made-all-of-us-wannacry">WannaCry Ransomware Attack</a> was all over the news being, what some will say, is the biggest cyberattack to date.</p> <!--more--> <p>Shortly after this incident, Adylkuzz was discovered, using the same vulnerability and exploit as <strong>WannaCry</strong> – specifically, the <a href="https://blogs.cisco.com/security/talos/adylkuzz-uiwix-eternalrocks">ETERNALBLUE SMB exploit</a>. This allowed Adylkuzz to remotely access vulnerable computers and load the <strong>DOUBLEPULSAR</strong> <strong>backdoor</strong>. In turn, this was used to install the Trojan payload. The payload itself uses the victim's computer as a node in a <a href="http://www.pandasecurity.com/mediacenter/malware/adylkuzz-new-virus-wannacry/">cryptocurrency-mining</a> botnet, specifically mining <a href="https://www.bleepingcomputer.com/virus-removal/remove-the-adylkuzz-msiexev.exe-wuauser.exe-miner-trojan">Monero</a>.</p> <p>Targets for infection are discovered via large scale scanning of the Internet, targeted at TCP port 445 (SMB). On discovery of a system with a vulnerable port, Adylkuzz uses ETERNALBLUE to access the system, and backdoors it using DOUBLEPULSAR. Once in place, the port is blocked – preventing rival malware from interrupting its process, while also disrupting communications with legitimate SMB services – mining software is then loaded into the computer, and launched in the background.</p> <p>The effects of the infection will be most apparent to the user when the miner begins trying to find cryptocurrency signatures. At this point, the user will likely notice a general slowdown in computer performance, as well as spikes in CPU temperature (potentially leading to permanent CPU damage). This is due to all CPU resources being rededicated to mining for coin, and can be detected by listening for fan cooling fan spin-up. Earlier symptoms will include <a href="https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar">loss of connection to SMB based services</a> (Windows file and printer shares with non-Windows devices).</p> <p>Enabling the <strong>TSCritical</strong> targets in your user policy will add protection against Adylkuzz to your ThreatSTOP DNS and IP Firewall Services. If you do not have a ThreatSTOP account&nbsp; for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to DNS or IP Firewall policies are available on the ThreatSTOP Documentation Hub, or contact our&nbsp; team.</p></span>