Updated July 18, 2019
Investigators are discovering this year’s species
It supports one of 8 types of systemic infections
Some bad plugins use UPnP and SMB protocols.
The Plurok virus, which was developed and named Mingv GCC, was discovered by Kaspersky researchers in February last year.
Who believes, he saw the back door during the test.
The switch is connected to server 2 and is available
TCP protocols are a bad part of the encryption process
Depending on the file, clean and install the infected substance
June 18 Kaspersky blog Post: [Posted by: researcher Ankoko Kokuma
Kaspersky noted that he identified two underlines
Additional operation of the gates The former only receives cryptocurrency
The latter introduces both reactors and add-ons using universal plugs
Open the network protocol and the network server block
Discover eight software auto_proc, auto_cuda,
auto_miner, auto_opencl_amd, auto_gpu_intel, auto_gpu_nvidia,
auto_gpu_cuda and auto_gpu_amd. The virus has been transmitted to the C2 server
The victims vehicle system was activated
Information on eight additional reactors will be loaded.
The specific purpose of the UPnP and SMB extensions is to protect the network from infected machines.
It spreads like a worm in Kozman. Kaspersky noted that the UPnP plugin in NS is very similar to EternalSilence.
The SMB module uses EternalBlue to distribute malware through the NSA.