Agregátor RSS

Deep Learning Market to Witness Huge Growth by 2027 | With Covid-19 Impact on Market Size …

Home AI - 2 hodiny 36 min zpět

The global Deep Learning market report covers an overview of the key company profiles of major market players and a detailed study of the …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Data Science Platform Market Incredible Possibilities, Growth with Industry Study, Detailed …

Home AI - 2 hodiny 47 min zpět

Data Science Platform Market size report contains growth rate, revenue, segmentation with product type, application, end-users, regions, manufacturers, …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Global Artificial Intelligence of Things Markets 2020-2025: Focus on Technology & Solutions – AIoT …

Home AI - 2 hodiny 47 min zpět

Many industry verticals will be transformed through AI integration with enterprise, industrial, and consumer product and service ecosystems. It is destined …


Link to Full Article: Read Here

Kategorie: Transhumanismus

On the trail of the XMRig miner

Kaspersky Securelist - 2 hodiny 54 min zpět

As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions. Several such solutions (previously unseen by us) were detected during our analysis of the open source miner XMRig.

How it all began: ransominer

Alongside well-known groups that make money from data theft and ransomware (for example, Maze, which is suspected of the recent attacks on SK Hynix and LG Electronics), many would-be attackers are attracted by the high-profile successes of cybercrime. In terms of technical capabilities, such amateurs lag far behind organized groups and therefore use publicly available ransomware, targeting ordinary users instead of the corporate sector.

The outlays on such attacks are often quite small, so the miscreants have to resort to various stratagems to maximize the payout from each infected machine. For example, in August of this year, we noticed a rather curious infection method: on the victim’s machine, a Trojan (a common one detected by our solutions as Trojan.Win32.Generic) was run, which installed administration programs, added a new user, and opened RDP access to the computer. Next, the ransomware Trojan-Ransom.Win32.Crusis started on the same machine, followed by the loader of the XMRig miner, which then set about mining Monero cryptocurrency.

As a result, the computer would already start earning money for the cybercriminals just as the user saw the ransom note. In addition, RDP access allowed the attackers to manually study the victim’s network and, if desired, spread the ransomware to other nodes.

Details about Trojan files:

  • Mssql — PC Hunter x64 (f6a3d38aa0ae08c3294d6ed26266693f)
  • mssql2 — PC Hunter x86 (f7d94750703f0c1ddd1edd36f6d0371d)
  • exe — nmap-like network scanner (597de376b1f80c06d501415dd973dcec)
  • bat — removes shadow copy
  • bat — creates a new user, adds it to the administrators group, opens the port for RDP access, and starts the Telnet server
  • exe — IOBIT Unlocker (5840aa36b70b7c03c25e5e1266c5835b)
  • EVER\SearchHost.exe — Everything software (8add121fa398ebf83e8b5db8f17b45e0)
  • EVER\1saas\1saas.exe — ransomware Trojan-Ransom.Win32.Crusis (0880430c257ce49d7490099d2a8dd01a)
  • EVER\1saas \LogDelete — miner loader (6ca170ece252721ed6cc3cfa3302d6f0, HEUR:Trojan-Downloader.Win32.Generic)

Batch script systembackup.bat adds a user and opens access via RDP

We decided to use KSN to examine how often XMRig and its modifications get bundled with malware. It emerged that in August 2020 there were more than 5,000 attempts to install it on users’ computers. The parties responsible for its distribution turned out to be the Prometei malware family and a new family called Cliptomaner.

Prometei backdoor

The Prometei family has been known since 2016, but spotted together with XMRig for the first time in February 2020. What’s more, the backdoor was distributed in an unusual way: whereas during ordinary attacks the cybercriminals gain server access through various exploits, this time they used brute-force attacks. Having thus obtained usernames and passwords for computers with MS SQL installed, the attackers used the T-SQL function xp_cmdshell to run several PowerShell scripts and elevated the privileges of the current user by exploiting the CVE-2016-0099 vulnerability. After that, Purple Fox Trojan and Prometei itself were installed on the victim’s machine. The whole attack, starting with the brute-forcing of credentials to connect to the SQL server and ending with the installation of Prometei, was carried out in fully automatic mode.

The installation process is of interest: the .NET executable file, packed into an ELF file using standard .NET Core tools (Apphost), sends information about the infected machine to the C&C server, and then downloads the cryptocurrency miner and its configuration. The versions of the loaders for Windows and Linux differ only slightly: the .NET build for different platforms saved the attackers from having to create a separate loader for Linux and allowed cryptocurrency mining on powerful Windows and Linux servers.

Cliptomaner miner

Detected in September 2020, Cliptomaner is very similar to its fellows: like them, it not only mines cryptocurrency, but can also substitute cryptowallet addresses in the clipboard. The miner version is selected according to the computer configuration and downloaded from C&C. The malware is distributed under the guise of software for Realtek audio equipment. On the whole, we saw no new techniques, but interestingly Cliptomaner is written entirely in the AutoIT scripting language. Most of the time, families with similar behavior are written in compiled languages, such as C# or C, but in this case the authors opted for a more creative approach, and wrote a lengthy script that selects the required version of the miner and receives cryptowallet addresses from C&C for substitution.

Substituting cryptowallets in the clipboard

Kaspersky security solutions detect the above malicious programs with the following verdicts: HEUR:Trojan.MSIL.Prometei.gen, HEUR:Trojan.Script.Cliptomaner.gen, HEUR:Trojan-Downloader.Win32.Generic, Trojan-Ransom.Win32.Crusis, Trojan.Win64.Agentb, not-a-virus:RiskTool.Win64.XMRigMiner

Indicators of compromise (IoC) Domains

taskhostw[.]com
svchost[.]xyz
sihost[.]xyz
srhost[.]xyz
2fsdfsdgvsdvzxcwwef-defender[.]xyz

Cryptowallets used for substitution

LTC: LPor3PrQHcQv4obYKEZpnbqQEr8LMZoUuX
BTC: 33yPjjSMGHPp8zj1ZXySNJzSUfVSbpXEuL
ETH: 0x795957d9753e854b62C64cF880Ae22c8Ab14991b
ZEC: t1ZbJBqHQyytNYtCpDWFQzqPQ5xKftePPt8
DODGE: DEUjj7mi5N67b6LYZPApyoV8Ek8hdNL1Vy

MD5

1273d0062a9c0a87e2b53e841b261976
16b9c67bc36957062c17c0eff03b48f3
d202d4a3f832a08cb8122d0154712dd1
6ca170ece252721ed6cc3cfa3302d6f0
1357b42546dc1d202aa9712f7b29aa0d
78f5094fa66a9aa4dc10470d5c3e3155

Intel prodává NAND divizi, koupí ji Hynix za $9 miliard

CD-R server - 2 hodiny 55 min zpět
Vývoj a výroba paměťových technologií společnosti Intel se pomalu zeštíhlují. Poslední zbytky výroby skončí u Hynixu, takže NAND vyráběné Intelem budou brzy minulostí…
Kategorie: IT News

Tisíc koní pod kapotou a rychlé nabíjení: Automobilka General Motors konečně představila elektrický Hummer

Živě.cz - 3 hodiny 20 sek zpět
Automobilka General Motors konečně představila svůj dlouho očekávaný plně elektrický Hummer. Ten se chlubí výkonem 1000 koní a dojezdem cca 560 kilometrů na jedno dobití. Kromě toho disponuje speciální funkcí zvanou „Crab Mode“, o níž jsme podrobněji psali v tomto článku.
Kategorie: IT News

Ex-GAM CEO Solo resigns as Credit Suisse revamps systematic shop

Home AI - 3 hodiny 10 min zpět

The firm aimed to use the latest scientific research from the fields of physics, complex self-organising systems, deep learning and behavioural finance.


Link to Full Article: Read Here

Kategorie: Transhumanismus

Asistent Googlu možná zareaguje i bez „OK Google.“ Na YouTube koluje video

Živě.cz - 3 hodiny 10 min zpět
Jistý Jan Boromeusz zveřejnil na YouTube krátké video s displejem Nest Hub Max od Googlu. Ten je vybavený hlasovou asistencí, přičemž doposud platilo, že aby začala asistentka poslouchat, bylo třeba ji aktivovat zvoláním: „OK Google,“ případně: „Hej Google.“ Boromeusz ale ve videu, pokud je tedy ...
Kategorie: IT News

Automate Image-based Inspection With sentin VISION System

Home AI - 3 hodiny 32 min zpět

Advantages of AI over human inspection or applications. The human brain is beaten by artificial intelligence in terms of consistency and reliability.


Link to Full Article: Read Here

Kategorie: Transhumanismus

Pandemic makes data science skills vital for SA

Home AI - 3 hodiny 55 min zpět

by AKANI CHAUKE JOHANNESBURG, (CAJ News) – THE largest data science academy in the continent believes the coronavirus (COVID-19) …


Link to Full Article: Read Here

Kategorie: Transhumanismus

ETH Zurich opens new center for Artificial Intelligence

Home AI - 3 hodiny 57 min zpět

The Swiss Federal Institute of Technology in Zurich (ETH) has opened a new research center for Artificial Intelligence. The Managing Director is …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Vychází Ubuntu 20.10 Groovy Gorilla: prohlédněte si nejčerstvější desktop

ROOT.cz - 4 hodiny 15 min zpět
Dnes vychází očekávané Ubuntu 20.10 Groovy Gorilla. Přináší opět čerstvé prostředí GNOME, vylepšený panel aplikaci, podporu přihlašování biometrikou, snadné vytvoření Wi-Fi hotspotu či dostupnější restart.
Kategorie: GNU/Linux & BSD

Machine Learning Artificial intelligence Market 2020: Global Industry Analysis by Size, Share …

Home AI - 4 hodiny 17 min zpět

This extensive research report focusing on global Machine Learning Artificial intelligence market portrays a detailed analytical assessment of notable …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Bitcoin se probudil. Cena šplhá vzhůru a je nejvyšší za poslední rok

Živě.cz - 4 hodiny 26 min zpět
Bitcoin dal o sobě po čase opět vědět. Jeho cena nyní šplhá vzhůru a atakuje hranici 13 tisíc dolarů za minci. Tak vysoko byla cena naposledy v červenci loňského roku. Po loňském létu zájem o kryptoměnu postupně zeslábl a růst ceny se obnovil až začátkem letošního roku. Na jaře však přišel ...
Kategorie: IT News

Global Deep Learning Chipset Market 2020 With Covid-19 Pandemic Analysis, Growth Rate And …

Home AI - 4 hodiny 40 min zpět

Top Key players profiled in the Deep Learning Chipset market report include: NVIDIA, Intel, IBM, Qualcomm, CEVA, KnuEdge, AMD, Xilinx, ARM, Google …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Machine Learning Courses Market 2019 Share, Size, Future Demand, Global Research, Top …

Home AI - 5 hodin 2 min zpět

The latest report titled 'Global Machine Learning Courses Market,' published by Market Expertz, provides the reader with a comprehensive view of the …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Deciphering Extinct Ancient Languages with Machine Learning

Home AI - 5 hodin 2 min zpět

There is no doubt there were several ancient languages existed back then that are now either vanishing or already became extinct. Such languages …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Deep Learning in Drug Discovery and Diagnostics Market Announces Rise in Industry Demand …

Home AI - 5 hodin 25 min zpět

The information is gathered based on modern floats and requests identified with the administrations and items. The global Deep Learning in Drug …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Data Reply Achieves AWS Machine Learning Competency Status

Home AI - 5 hodin 25 min zpět

Data Reply has a deep expertise in supporting companies in the implementation of advanced analytics and AI-powered data services on AWS. With …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Mental Health & Machine Learning – Notes from Tiger Analytics

Home AI - 5 hodin 25 min zpět

… networks, decision trees and support vector machines. Clinical trials are monitored and assessed remotely to maintain physical distancing protocols.


Link to Full Article: Read Here

Kategorie: Transhumanismus
Syndikovat obsah