{
	"id": "8fdbad8c-7deb-4319-8e5e-a421509dd5f9",
	"created_at": "2026-04-06T00:19:01.05833Z",
	"updated_at": "2026-04-10T03:20:07.236264Z",
	"deleted_at": null,
	"sha1_hash": "e28ae1633d6c1f0e706cda832fba4247443d4fdd",
	"title": "Enterprise Cybersecurity Solutions, Services \u0026 Training | Proofpoint US",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 8767328,
	"plain_text": "Enterprise Cybersecurity Solutions, Services \u0026 Training |\r\nProofpoint US\r\nArchived: 2026-04-05 18:35:07 UTC\r\nhttps://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar\r\nPage 1 of 7\n\nData security and governance in the age of AI\r\nGet ahead of the risks from sanctioned and unsanctioned use.\r\nRead the guide\r\nWe are Proofpoint\r\nWe secure how people, data and AI agents connect across email, cloud and\r\ncollaboration tools\r\nStopping\r\n95M\r\nBEC attacks per year\r\nProtecting\r\n2.7M\r\ncustomers\r\nOf the F100\r\n83\r\nuse Proofpoint to stop attacks and defend their data\r\nStopping\r\n95M\r\nBEC attacks per year\r\nProtecting\r\n2.7M\r\ncustomers\r\nOf the F100\r\n83\r\nuse Proofpoint to stop attacks and defend their data\r\nhttps://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar\r\nPage 2 of 7\n\nWhy Proofpoint\r\nTwo million customers including 83 of the Fortune 100 rely on Proofpoint security\r\nsolutions\r\nAI is transforming the digital workspace and giving rise to the agentic workspace, where every collaboration—\r\nwhether by a person or an AI agent—introduces new risks.\r\nWe give organizations the security solutions they need to protect their people and secure their data while\r\nembracing the AI revolution.\r\nDiscover Why Proofpoint\r\nCollaboration Security\r\nhttps://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar\r\nPage 3 of 7\n\nStop all human-centric and AI-centric threats\r\nProtect humans and agents from threats targeting them across all points of collaboration—email, messaging tools,\r\nsocial media platforms, cloud apps, and file-sharing services with world leading AI-based detection.\r\nLearn more\r\nData Security and Governance\r\nSafeguard information and digital communications\r\nCareless users mishandle it. Malicious users walk out with it. Compromised user accounts are hijacked to steal it.\r\nAnd with the rise of the agentic workspace, non-compliant users, agents or AI tools abuse it. Proofpoint’s unified\r\napproach shows you where your data is, who or what has access to it—and helps you protect it.\r\nLearn more\r\nTHE PROOF\r\nWe’re recognized as an industry leader by our peers and customers alike\r\nCollaboration Security\r\nData Security and Governance\r\nDigital Communications Governance\r\nOUR CUSTOMERS\r\nTrusted to protect the world’s leading organizations\r\nhttps://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar\r\nPage 4 of 7\n\nSorry\r\nBecause of its privacy settings, this\r\nvideo cannot be played here.\r\nProofpoint helps Accenture secure people, data and operations.\r\nhttps://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar\r\nPage 5 of 7\n\nSorry\r\nBecause of its privacy settings, this\r\nvideo cannot be played here.\r\nWyndham blocks 99.99% of threats, significantly reducing BEC risks while employees reporting\r\nincreased phishing awareness with Proofpoint ZenGuide\r\nTM.\r\nhttps://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar\r\nPage 6 of 7\n\n1-800-GOT-JUNK? relies on Proofpoint to protect its expanding global network.\r\nRESOURCES\r\nGet the latest industry insights, reports and press releases\r\nSource: https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-dou\r\nblepulsar\r\nhttps://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar\r\nPage 7 of 7",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar"
	],
	"report_names": [
		"adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar"
	],
	"threat_actors": [],
	"ts_created_at": 1775434741,
	"ts_updated_at": 1775791207,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e28ae1633d6c1f0e706cda832fba4247443d4fdd.pdf",
		"text": "https://archive.orkl.eu/e28ae1633d6c1f0e706cda832fba4247443d4fdd.txt",
		"img": "https://archive.orkl.eu/e28ae1633d6c1f0e706cda832fba4247443d4fdd.jpg"
	}
}