Technology
BlueKeep mass attacking vulnerable machines
San Francisco, Nov 4
The "BlueKeep" remote code execution vulnerability, which could have an effect similar to the WannaCry bug from 2017, is currently attacking vulnerable machines that are apparently compromised for cryptocurrency mining purposes, according to media reports.
The BlueKeep vulnerability exists in unpatched versions of Windows Server 2003, Windows XP, Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2.
According to security researcher Kevin Beaumont, several honeypots in his EternalPot RDP honeypot network started to crash and reboot.
They've been active for almost half a year and this is the first time they came down. For some reason, the machines in Australia did not crash, the researcher said in a tweet, Bleeping Computer reported on Sunday.
Security researchers, including Beaumont who originally named the vulnerability and Marcus Hutchins, also known as "MalwareTech", who was responsible for hitting the kill switch that stopped the WannaCry bug, have confirmed that a widespread BlueKeep exploit attack is now currently underway.
Hutchins was quoted as saying by the Wired that "BlueKeep has been out there for a while now. But this is the first instance where I've seen it being used on a mass scale."
Interestingly, BlueeKeep has the ability to spread itself from one machine to another, while the attackers are searching for vulnerable unpatched Windows systems that have Remote Desktop Services (RDP) 3389 ports exposed to the Internet.
For now though, this looks like being an attack campaign with a cryptocurrency miner payload, according to Forbes.
The BlueKeep vulnerability exists in unpatched versions of Windows Server 2003, Windows XP, Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2.
According to security researcher Kevin Beaumont, several honeypots in his EternalPot RDP honeypot network started to crash and reboot.
They've been active for almost half a year and this is the first time they came down. For some reason, the machines in Australia did not crash, the researcher said in a tweet, Bleeping Computer reported on Sunday.
Security researchers, including Beaumont who originally named the vulnerability and Marcus Hutchins, also known as "MalwareTech", who was responsible for hitting the kill switch that stopped the WannaCry bug, have confirmed that a widespread BlueKeep exploit attack is now currently underway.
Hutchins was quoted as saying by the Wired that "BlueKeep has been out there for a while now. But this is the first instance where I've seen it being used on a mass scale."
Interestingly, BlueeKeep has the ability to spread itself from one machine to another, while the attackers are searching for vulnerable unpatched Windows systems that have Remote Desktop Services (RDP) 3389 ports exposed to the Internet.
For now though, this looks like being an attack campaign with a cryptocurrency miner payload, according to Forbes.

8 hours ago
Pakistan: Minority rights group spotlights surge in violence against transgender community

8 hours ago
Netanyahu: Situation in Sweida and south western Syria very serious

10 hours ago
FBI adds 3 Iranian intelligence officers to wanted list over Levinson case

10 hours ago
Alberta Premier urges Canadian PM to designate Lawrence Bishnoi gang as 'terrorist entity'

10 hours ago
Trump administration withdraws 2,000 National Guard Troops from Los Angeles as protest eases

11 hours ago
Trump cuts tariff on Indonesian imports to 19 per cent under new trade deal

12 hours ago
Cash row: Fresh plea in SC seeks FIR against Justice Yashwant Varma

12 hours ago
Kerala HC closes case, MoS Suresh Gopi's film to release tomorrow

13 hours ago
Shreya Ghoshal: There is so much innocence, purity in ‘Saiyaara’

13 hours ago
Ravi Teja's dad Rajagopal Raju passes away

13 hours ago
India’s maiden Hollywood star Sabu gets a biopic

13 hours ago
Akshay Oberoi jets off to US as he’s set to make his international debut

14 hours ago
Twinkle shares picture with Akshay Kumar after ‘long day of cricket’