Sunday, July 5, 18:12
Home security Lucifer: The powerful malware targeting Windows calculators!

Lucifer: The powerful malware targeting Windows calculators!

The new powerful encryption malware and DDoS, "Lucifer", exploits seriously vulnerabilities to infect Windows computers. According to Palo Alto Networks' Unit 42, Lucifer is part of an active campaign which targets Windows computers and uses a variety of applications. The malware operators gave their creation the name "Satan DDoS". But because Satan Ransomware is elsewhere, Palo Alto gave it another name.

Lucifer malware

In a blog post, researchers Ken Hsu, Durgesh Sangvikar, Zhibin Zhang and Chris Navarrete reported that the latter variation of Lucifer, v.2, was discovered on May 29, in an attempt to exploit CVE-2019-9081, a bug deserialization in the Laravel Framework, which can be used in attacks remote code execution. After a more detailed examination it was proved that this is a vulnerability of the many that exploits malware in parallel with CVE-2014-6287, CVE-2018-1000861, CVE-2017-10271, ThinkPHP RCE vulnerabilities (CVE-2018-20062) , CVE-2018-7600, CVE-2017-9791, CVE-2019-9081, CVE-2017-0144, CVE-2017-0145 and CVE-2017-8464, among others.

malware

The updated code versions are available for all errors security, but on uninformed central computers, the attacks that exploit these errors are often insignificant to exploit, and executing code to extract cryptocurrencies is one of the ultimate goals. Lucifer is considered a powerful hybrid malware, which has the ability to encrypt and exploit infected computers to carry out DDoS attacks. In addition, malware seeks open ports TCP 135 (RPC) and 1433 (MSSQL) to find targets and attacks with credentials to gain access. It can infect its targets via IPC, WMI, SMB and FTP via brute-force attacks, as well as via MSSQL, RPC and network sharing. Once Lucifer is installed on an infected device, it "throws" XMRig, a program used to extract cryptocurrency Monero (XMR). It also connects to a command-and-control (C2) server to receive commands, transfer data from the compromised system and inform its operators about the status of the Monero cryptocurrency miner. To spread Lucifer, it uses various vulnerabilities and brute-force attacks, trying to compromise more Windows computers connected to the original point of infection. Malware also violates the Windows registry to be programmed as work at startup. It also tries to avoid detection by controlling the presence of sandboxes or virtual machines.


The first wave of attacks using Lucifer v.1 was detected on June 10. A day later, the malware was upgraded to version 2, which was particularly devastating for the devices that were targeted. Researchers recommend that users apply the required patches and updates in the affected software.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

Bitcoin scam attracts people with "bait" celebrities!

A bitcoin multi-stage scam exposed and used personally identifiable information (PII) to deceive users by prompting them to sign up for a ...

iPhone: What to do to boost your security?

One of the most important features of iOS is security. Rarely does a malicious application pass to ...

COVID-19: New research looks for antibodies in blood donors

The American Red Cross is examining the blood that has come from donations, and is looking for COVID-19 antibodies that will give it ...

Digital Transformation and Business: What Does Its Failure Mean?

Digital transformation is usually a way for businesses to outperform their competitors and get rid of methods that ...

Covaxin: India releases COVID-19 vaccine in August

The whole planet is waiting for the release of the vaccine for coronavirus, while clinical trials have begun in many countries around the world ....

iOS 13.5.1: iPhone users report battery issues

Have you noticed any changes to your iPhone lately? Maybe, for example, the battery runs out quickly ...

Avaddon ransomware: Attacks through Excel 4.0 macros

Microsoft announced yesterday that Avaddon ransomware spread this week through an old technique that came to the fore again. The...

Apple: Prohibits updating Chinese Apps without permission

Apple is banning developers from updating existing apps in China's App Store if they don't have government approval.

Australia: Thousands of MyGov accounts are sold on the Dark Web

Access to more than 3600 MyGov accounts is being sold on the dark web, potentially exposing thousands of Australians to fraud and identity theft.
00:03:03

Party Time: Watch TV with your friends online

Party Time: Watch TV with your friends on the internet Time for a different party than you are used to, watching your favorite ...