EternalRomanceīad Rabbit, another ransomware, shared many elements of the code found in NotPetya. ![]() These commands were then used to mine and extract cryptocurrencies. The malware NotPetya, which came to light just a month later, was able to get onto systems thanks to this vulnerability, stealing passwords in order to take control of the network that it accessed.Īnd we’re not just talking about ransomware: shortly after the WannaCry attacks, we started to see a piece of malware called Adylkuzz, which used EternalBlue to download a series of commands onto infected computers. The most famous use was WannaCry, which affected over 300,000 companies all over the world, and cost a total of around $4 billion. And the list of attacks that have been made possible by this vulnerability is extensive. It came to light in April 2017, when the hacking group the Shadow Brokers revealed that the NSA was collecting vulnerabilities of this kind. It is called EternalBlue, and it was allegedly developed by the US National Security Agency (NSA). One of the most problematic vulnerabilities of the last year is one that affects Microsoft Server Message Block (SMB). In this article we’ve compiled some of the most infamous vulnerabilities and the problems they’ve caused for the IT systems where they’ve been found. The costs that these attacks suppose for businesses and users also add to the problem: it is estimated that by 2021 the cost of cybercrime will reach $6 trillion.īut as well as sharing a goal of making money, many of the most costly cyberincidents in the last few years have shared another characteristic: they have been made possible thanks to an unpatched vulnerability in an IT system. And as a consequence, the range of possible cyberthreats is considerably larger. The digital transformation makes the task of reducing the attack surface more difficult, given the exponential growth of users, devices, systems, and third party applications that need to be updated.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |