Updated July 18, 2019
Earlier this year, scientists discovered a modular door
It offers one of eight different cryptometers for infected systems
Malicious add-ons that use the UPnP and SMB protocols.
Malicious software, known as BlueRax, written in C and co-authored with Mingv GCC, was discovered last February by Kaspersky
scientists.
They think they found the door, even though it went inside.
BlueRox receives and receives commands from the C2 server
TCP is part of the process of detecting malicious activity
Connected to the installation and operation of contaminated equipment
June 18 Kaspersky blog post [Author Anton Guzmenko.
Kaspersky noted that the monitor identified two sub-components
Turn the back door. Initially, you only buy cryptocurrency
The following miners and descriptions also confirm global plugin support.
Server network blocking and Internet messaging protocol
minutes
Kaspersky eight mines auto_prok, auto_coda, a
Auto_gpu_nvidia, Auto_gpu_Intel, Auto_gpu_nital,
Auto_gpu_cuda and Auto_gpu_amd. The malware reports the C2 server
Participants set up and download the system
Download the information for Mine Eight attachments.
The obvious purpose of using UPnP and SMB plugins is to create a patient computer and network.
It spreads like a worm, writes Kozmanko. Kaspersky confirms that the UPnP plugin is similar to how EternSilence NSA works,
SMB input has already been used by the NSA to distribute malware via Ethernet Blue.