Updated July 18, 2019
Scientists discovered a modular grip earlier this year
Provide one of eight different cryptocurrencies of the infected system
Malicious plugin that uses UNNP and SMB protocols.
Kaspersky discovered a malicious program called Plurax, written in the city and developed by Mingdu GCC in February.
During the experiment, the believer found the back door.
Plurux communicates with its C2 server and receives commands
TCP protocol to determine which of these processes is the worst
Installation and repair of infected equipment, C.F.
Published by Kaspersky Blog on June 18 [scientist Anton Kuzmenko.
Kaspersky said he received two text messages while working.
Hidden work. Previously, it was only available in cryptocurrency.
Then you will find both the shaft and the connector through the universal connector.
Disable game network protocols and Internet messaging servers.
Kaspersky 8 utilities auto_prok, auto_kuda,
Auto_minier, auto_pencly_amd, auto_gpu_intel, auto_gpu_nvidia,
Auto_jipu_kuda and auto_jipu_amdi. The virus is reported on server C2.
The victim’s hardware system was damaged and repaired
No load information for 8 minutes.
Special tools for both ports using UPNP and SMB create an environment where utility networks can be disrupted.
It spreads like a bug, Kuzmenko writes. According to Kaspersky, UPNP plugins seem to be localization exploits.
The SMB module uses Eternal Blue to spread malware using NSA.