The BlueKeep (Windows Remote Desktop Services) vulnerability was exploited by attackers to deliver cryptocurrency mining malware.
Researchers say that BlueKeep, which was addressed in May, allows unauthenticated attackers to execute arbitrary code, by sending crafted Remote Desktop Protocol (RDP) requests. The company warned that the vulnerability could allow malware to spread just the same the EternalBlue exploit was used back in 2017, by the WannaCry ransomware.
Microsoft warned the users to install the patch, which is available also for unsupported versions of Windows, including XP. Still, over 700,000 systems are vulnerable to attacks.
The first mass exploitation attempts were noticed during the weekend. Kevin Beaumont, the researcher who named the vulnerability, has been running a honeypot network – BluePot, trying to catch exploitation attempts. Thus, he discovered that the attacks began on October 23, when the honeypots crashed and rebooted, but understood that it was due to BlueKeep only on November 2.
The two experts discovered that the attackers have been exploiting BlueKeep to deliver a Monero miner, a malware detected at this time by 31 antivirus engines on VirusTotal.
Beaumont wrote in a blog post that “People now understand how to execute attacks on random targets, and they are starting to do it. This activity doesn’t cause me to worry, but it does cause my spider sense to say ‘this will get worse, later.” Then, he reported on Twitter that all BlueKeep activity has stopped.
Error 0x80070035, “Network path was not found,” is a common issue that occurs when attempting…
Are you experiencing lower PC performance, slow Valorant loading, and sluggish response? Do you want…
Do you wish to gain visibility and control over your network? Then, you need the…
Suppose you're about to print any important documents, and suddenly you see the “printer driver…
An audio editing software is a smart move to add a professional touch and magic…
Canon is renowned for its world-class printers, the Canon LBP2900B being one of them. To…
View Comments