Enterprise Cybersecurity Solutions, Services & Training | Proofpoint US Archived: 2026-04-05 18:35:07 UTC https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar Page 1 of 7 Data security and governance in the age of AI Get ahead of the risks from sanctioned and unsanctioned use. Read the guide We are Proofpoint We secure how people, data and AI agents connect across email, cloud and collaboration tools Stopping 95M BEC attacks per year Protecting 2.7M customers Of the F100 83 use Proofpoint to stop attacks and defend their data Stopping 95M BEC attacks per year Protecting 2.7M customers Of the F100 83 use Proofpoint to stop attacks and defend their data https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar Page 2 of 7 Why Proofpoint Two million customers including 83 of the Fortune 100 rely on Proofpoint security solutions AI is transforming the digital workspace and giving rise to the agentic workspace, where every collaboration— whether by a person or an AI agent—introduces new risks. We give organizations the security solutions they need to protect their people and secure their data while embracing the AI revolution. Discover Why Proofpoint Collaboration Security https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar Page 3 of 7 Stop all human-centric and AI-centric threats Protect humans and agents from threats targeting them across all points of collaboration—email, messaging tools, social media platforms, cloud apps, and file-sharing services with world leading AI-based detection. Learn more Data Security and Governance Safeguard information and digital communications Careless users mishandle it. Malicious users walk out with it. Compromised user accounts are hijacked to steal it. And with the rise of the agentic workspace, non-compliant users, agents or AI tools abuse it. Proofpoint’s unified approach shows you where your data is, who or what has access to it—and helps you protect it. Learn more THE PROOF We’re recognized as an industry leader by our peers and customers alike Collaboration Security Data Security and Governance Digital Communications Governance OUR CUSTOMERS Trusted to protect the world’s leading organizations https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar Page 4 of 7 Sorry Because of its privacy settings, this video cannot be played here. Proofpoint helps Accenture secure people, data and operations. https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar Page 5 of 7 Sorry Because of its privacy settings, this video cannot be played here. Wyndham blocks 99.99% of threats, significantly reducing BEC risks while employees reporting increased phishing awareness with Proofpoint ZenGuide TM. https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar Page 6 of 7 1-800-GOT-JUNK? relies on Proofpoint to protect its expanding global network. RESOURCES Get the latest industry insights, reports and press releases Source: https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-dou blepulsar https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar Page 7 of 7