Large organizations running Windows-based networks have been attacked by the WannaMine worm and, according to industry watchers, no end is in sight. © Sputnik / Kirill KallinikovMainstream Media Warns of ‘Russian Malware’, Ignores CIA’s Own Virus Development The core exploit used in WannaCry is a potent US National Security Agency (NSA) software tool released online called EternalBlue. Originally created to make use of vulnerabilities within the Windows environment for the purpose of widespread surveillance, the NSA code is now being leveraged by the WannaMine worm, although with some enhancements. Cryptocurrency-mining malware acts to take over the resources of a computer or a network for the purpose of generating cryptocurrency, rendering the machines useless for any other task. Other malware attacks over the past year that made use of the NSA’s EternalBlue tool include NotPetya and Adylkuzz. Although many servers around the world spreading WannaMine were quickly taken down, the malware continues to replicate. Recently-published research by Cybereason security chief Amit Serper noted an earlier attack on a Fortune 500 company — a Cybereason client — that was devastated by WannaMine. According to Serper, the malware infected “dozens of domain controllers and about 2,000 endpoints,” after entering a network through a Windows Server Message Block (SMB) network file sharing protocol server that — despite a massive WannaCry malware alert campaign — had not been patched. © AP Photo / Michel SpinglerUp to Their Old Tricks: New…