A complex malware named StripedFly infiltrated about one million devices undetected over five years, according to researchers at Kaspersky. Initially misidentified as a cryptocurrency miner, the software uses a combination of a custom EternalBlue SMBv1 exploit and SSH protocol to enter targets’ systems. The malware can disable the SMBv1 protocol on affected systems while carrying out various functions, including credential harvesting, executing processes and mining Monero.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some