Subscribe to Updates

    Get the latest scintillating tech news from TechWafer about gadgets and entrancing business news.

    What's Hot

    realme Pakistan Embarks on a Strategic Partnership with Advance Telecom

    May 17, 2022

    Huawei Nova 9 launch in Pakistan offers Photography enthusiasts a new powerful device to play with

    May 17, 2022

    Best Chromebook for Zoom Meetings 2022

    May 16, 2022
    TechWaferTechWafer
    • Technology
    • Mobile
    • How to
    • Hardware
    • Business
    • Gaming
    • Prices
    TechWaferTechWafer
    Home » NSA Exploit Now Powering Cryptocurrency Mining Malware
    Featured

    NSA Exploit Now Powering Cryptocurrency Mining Malware

    Muhammad Irfan RazaBy Muhammad Irfan RazaFebruary 27, 2018Updated:November 30, 20193 Mins Read
    NSA
    NSA
    ADVERTISEMENT

    You may have been asked if you’d like to try your hand at mining cryptocurrency. You may have disagreed, citing the shortage of graphics cards or perhaps wary you were being coaxed into an elaborate Ponzi scheme. So much for opting out. Thanks to the NSA, you may be involved in mining cryptocurrency, but you’re likely not seeing any of the benefits.

    NSA Exploit Now Powering Cryptocurrency Mining Malware

    A computer security exploit developed by the US National Security Agency and leaked by hackers last year is now being used to mine cryptocurrency, and according to cybersecurity experts the number of infections is rising.

    The good news is you won’t have to cough up a ransom to retake control of your computer. The bad news is this doesn’t guarantee you’ll have a functioning computer.

    ADVERTISEMENT

    This new attack—called WannaMine—may seem like less of a threat than WannaCry because it doesn’t lock users out of their computer. But CrowdStrike noted in a blog post laying out its findings on WannaMine that the company has observed the malware “rendering some companies unable to operate for days and weeks at a time.” WannaMine infections are also hard to detect because it doesn’t download any applications to an infected device.

    This is the path the NSA’s malware has taken: from worldwide ransomware to drive-by installations of mining software. The route to infection is still the standard route: malicious links. Once inside, the malware co-opts your processor for cryptocurrency mining. If your computer happens to be part of a network, the infection will spread to connected computers, turning entire businesses into someone else’s side hustle.

    The “fun” part is even patched systems can be infected. The NSA’s EternalBlue exploit may no longer work, but an attached tool called Mimikatz can still root around for login passwords to continue spreading the malware. The damage isn’t theoretical.

    For companies hit by WannaMine at scale though, the cumulative effects can be disastrous, [Bryan] York [director of CrowdStrike] told me. He cited a client that recently came to CrowdStrike for help after their network was infected by WannaMine, which York said was using so much CPU power that it totally shut down their service.

    “The implications of cryptocurrency mining aren’t just, ‘Oh darn, I lost some of my CPU,’” York said. “It’s actually getting in the way of how businesses conduct their operations and causing down time.”

    While this isn’t the first crypto miners based on NSA exploits to hijack users’ computers, it’s the hardest to track down and kill. It contains no application files, relying on Windows tools to perform the dirty work. No files written to disk make it all but invisible. And, unlike ransomware, there’s no way to pay someone to stop using your CPU to mine Monero. You can’t even buy your way out of the problem.

    This won’t be the last we’ll see of malicious software built on NSA hacking tools. It will serve as a continual reminder of the government’s untrustworthiness when it comes to secure computing, mass harvesting of data, and security tradeoffs performed without the input of the majority of stakeholders.

    (Counterpoint via @dril: maybe NSA-enabled crypto mining hijacking is the most patriotic thing there is.)

    io love helping the economy by fucking up while doing downloads and getting 100 coin miners installed on my pc

    — wint (@dril) February 4, 2018

    ADVERTISEMENT
    Share. Facebook Twitter WhatsApp Pinterest Reddit LinkedIn Tumblr
    NSA Exploit Now Powering Cryptocurrency Mining MalwareImage Name
    Muhammad Irfan Raza

    Irfan Raza is Editor at TechWafer covering Everything about Apple including Mac, iPhones, iMac, iMac Pro, MacBook, and How-tos.

    Related Posts

    Best Chromebook for Zoom Meetings 2022

    May 16, 2022

    POCO launches flagship POCO F4 GT smartphone – perfect for gamers!

    May 11, 2022
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks

    Best Chromebook for Zoom Meetings 2022

    May 16, 2022

    POCO launches flagship POCO F4 GT smartphone – perfect for gamers!

    May 11, 2022

    PlayStation 6: Price, Release Date, Specs, And Features

    May 9, 2022

    Realme 9 Pro+: Sony IMX766 Sensor Sets It Apart from the Competition

    April 30, 2022
    ADVERTISEMENT
    Latest Updates

    realme Pakistan Embarks on a Strategic Partnership with Advance Telecom

    May 17, 2022

    Huawei Nova 9 launch in Pakistan offers Photography enthusiasts a new powerful device to play with

    May 17, 2022

    Best Chromebook for Zoom Meetings 2022

    May 16, 2022
    About Us
    About Us

    TechWafer.com is one of growing technology blog reviewing internet products and covering latest technology news. Do you love technology as much we do?

    Facebook Twitter Instagram Pinterest YouTube
    Our Picks

    realme Pakistan Embarks on a Strategic Partnership with Advance Telecom

    May 17, 2022

    Huawei Nova 9 launch in Pakistan offers Photography enthusiasts a new powerful device to play with

    May 17, 2022

    Best Chromebook for Zoom Meetings 2022

    May 16, 2022
    Sections
    • Featured
    • Technology
    • Mobile
    • Gaming
    • How to
    • Entertainment
    • Software
    • Hardware
    COMPANY
    • About Us
    • Advertise
    • Team
    • Contact Us
    • Cookies Policy
    • Privacy Policy
    • DMCA Policy
    © 2022 TechWafer

    Type above and press Enter to search. Press Esc to cancel.