- Like the original ransomware, known as WannaCry, EternalRocks uses an NSA tool known as EternalBlue to spread itself from one computer to the next through Windows.
- EternalRocks is stronger that WannaCry because it does not have any weaknesses, including the kill switch.
EternalRocks exploits the same vulnerability in Windows that helped WannaCry spread to computers. The malware includes far more threats than WannaCry, making it potentially tougher to fight.
Like the original ransomware, known as WannaCry, EternalRocks uses an NSA tool known as EternalBlue to spread itself from one computer to the next through Windows. But it also uses six other NSA tools, with names like EternalChampion, EternalRomance, and DoublePulsar (which is also part of WannaCry), Fortune reported.
In its current form, EternalRocks does not have any malicious elements? It does not lock or corrupt files, or use compromised machines to build a botnet. But that?s not particularly reassuring, because EternalBlue leaves infected computers vulnerable to remote commands that could weaponize the infection at any time.
WannaCry, has hit over 150 countries, including India and affected over 240,000 machines, primarily those running unpatched versions of Windows 7. It encrypts files on infected machines and demands payment for unlocking them.
EternalRocks is stronger that WannaCry because it does not have any weaknesses, including the kill switch that a researcher used to help contain the ransomware.
EternalBlue also uses a 24-hour activation delay to try to frustrate efforts to study it, the report noted.
The researcher who found EternalRocks does not claim that it has spread very far yet, but its just one example of a wave of new malware based on the NSA-authored exploits. The consequences have already been serious, and they could get worse.
The last 10 days have seen a wave of cyber attacks that have rendered companies helpless around the globe. First it was WannaCry that spread by taking advantage of a Windows vulnerability that Microsoft released a security patch for in March. It encrypted files on infected machines and demanded payment for unlocking them.
WannaCry had some loopholes that made it easier to slow and circumvent.
Over 48,000 attempts of ransomware attacks were detected in India. With 60 per cent of the attempts targeted enterprises, while 40 per cent were on individual customers, a cyber security firm, Quick Heal Technologies had said.
Last Updated 31, Mar 2018, 6:54 PM