Technology
BlueKeep mass attacking vulnerable machines
San Francisco, Nov 4
The "BlueKeep" remote code execution vulnerability, which could have an effect similar to the WannaCry bug from 2017, is currently attacking vulnerable machines that are apparently compromised for cryptocurrency mining purposes, according to media reports.
The BlueKeep vulnerability exists in unpatched versions of Windows Server 2003, Windows XP, Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2.
According to security researcher Kevin Beaumont, several honeypots in his EternalPot RDP honeypot network started to crash and reboot.
They've been active for almost half a year and this is the first time they came down. For some reason, the machines in Australia did not crash, the researcher said in a tweet, Bleeping Computer reported on Sunday.
Security researchers, including Beaumont who originally named the vulnerability and Marcus Hutchins, also known as "MalwareTech", who was responsible for hitting the kill switch that stopped the WannaCry bug, have confirmed that a widespread BlueKeep exploit attack is now currently underway.
Hutchins was quoted as saying by the Wired that "BlueKeep has been out there for a while now. But this is the first instance where I've seen it being used on a mass scale."
Interestingly, BlueeKeep has the ability to spread itself from one machine to another, while the attackers are searching for vulnerable unpatched Windows systems that have Remote Desktop Services (RDP) 3389 ports exposed to the Internet.
For now though, this looks like being an attack campaign with a cryptocurrency miner payload, according to Forbes.
The BlueKeep vulnerability exists in unpatched versions of Windows Server 2003, Windows XP, Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2.
According to security researcher Kevin Beaumont, several honeypots in his EternalPot RDP honeypot network started to crash and reboot.
They've been active for almost half a year and this is the first time they came down. For some reason, the machines in Australia did not crash, the researcher said in a tweet, Bleeping Computer reported on Sunday.
Security researchers, including Beaumont who originally named the vulnerability and Marcus Hutchins, also known as "MalwareTech", who was responsible for hitting the kill switch that stopped the WannaCry bug, have confirmed that a widespread BlueKeep exploit attack is now currently underway.
Hutchins was quoted as saying by the Wired that "BlueKeep has been out there for a while now. But this is the first instance where I've seen it being used on a mass scale."
Interestingly, BlueeKeep has the ability to spread itself from one machine to another, while the attackers are searching for vulnerable unpatched Windows systems that have Remote Desktop Services (RDP) 3389 ports exposed to the Internet.
For now though, this looks like being an attack campaign with a cryptocurrency miner payload, according to Forbes.

1 hour ago
On UK trip, US President Trump highlights his ‘very good relationship’ with PM Modi

1 hour ago
Indian envoy to US meets senior Pentagon official, holds 'valuable discussion'

2 hours ago
Newark Airport ranks last once again; even the new Terminal A couldn’t save it.

4 hours ago
Trade deal with US to bolster India’s regional role: Report

6 hours ago
Trump administration unveils 'patriotic education' initiative as new priority for federal education grants

8 hours ago
Tucson City Council in Arizona to open with ancient Hindu prayers

8 hours ago
Did Deepika Padukone exit 'Kalki 2898 AD' due to commitment issues?

8 hours ago
Tannishtha Chatterjee wishes ‘incredible woman’ Shabana Azmi on 75th b’day

8 hours ago
Ananya Panday flaunts bronzed glow post her Maldivian holiday

8 hours ago
Divya Dutta to Shabana Azmi: You are supremely precious in my life

9 hours ago
Kerala a bridge between India and Europe: CM Vijayan on blue economy conclave

9 hours ago
Bengal student murder: Protest erupts at Birbhum school, headmaster thrashed

9 hours ago
India-US tariff stalemate likely to be resolved in 8-10 weeks: Chief Economic Advisor