Alltech IT Solutions Blog

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Double Pulsar was, in essence, a tool that enabled a user to install programs (read: malware) on a targeted PC. The original version was only effective against 32-bit operating systems, but with the addition of the Chinese hacking tool, newer operating systems and 64-bit machines were suddenly vulnerable. Based on evidence that they have found, Symantec has formed a hypothesis that the tool was constructed after Chinese hackers analyzed the network traffic from an actual Double Pulsar attack.

Of course, this tool could have simply been stolen from an unsecured server. Regardless of where it came from, the precedent for tools being taken and warped into attack vectors is a dangerous one.

While the hacking group that utilized the Double Pulsar tool seems to no longer be active, this doesn’t mean that others can’t use it for their own ends. Having said that, the Chinese tool also leveraged a since-patched Windows vulnerability, which hopefully makes it a lame duck.

This is also far from the first time that NSA hacking tools have been co-opted by hackers. In 2017, a group known as the Shadow Brokers stole and shared a cache of hacking tools online...including the name Double Pulsar. This only goes to show that this threat isn’t new - and that proper network security is only that much more important. This is before we even consider the fact that state actors develop these kinds of tools very aggressively and take far more liberties than others.

What are your thoughts? Are you worried about state-sponsored tools being leveraged against your business? Discuss it in the comments, and don’t forget to reach out to us for assistance in securing your business’ network against threats like these. Give us a call at 954-628-3770 to learn more about what we can do.

Is it Wrong to Purchase Access to Your Own Data?
Tip of the Week: Windows 10 Taskbar Tips
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 17 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

HP Sports Hackers Payment Cards Samsung Communication Automobile Scam PowerPoint Cybersecurity Spam Blocking Video Computer Care Cloud Router disposal Applications Copy Vendor Management Data Backup Backup and Disaster Recovery Facebook Television Instagram Disaster Recovery Hard Drive Workers Settings Managing Stress Mobile Devices Android Network Software Network Attached Storage Smartphones Telephony Microsoft Teams Bitcoin HaaS Botnet CrashOverride IT Support Physical Security IaaS Microsoft Office Security Cameras Virus Webcam National Security A.I. Cryptocurrency Wireless Hacking DDoS Threat Small Business Paper Staff Windows Server 2008 R2 Windows 10 Backup Internet of Things File Sharing Live Streaming Processors Travel Employee-Employer Relationship Alert Vulnerability Document Management Internet Inventory Worker Remote Control Gadget Virtualization Budget Gmail Productivity News Reporting Websites Processor Streaming Media Trends Work/Life Balance Unified Threat Management Retail Knowledge Collaboration Information The Internet of Things Two-factor Authentication Email Management Machine Learning Efficiency Autocorrect Business Computing Ink Remote Computing Certification eWaste Benchmarks G Suite Wireless Charging Electronic Health Records Licensing Workplace Tips Scheduling Hard Drives Virtual Assistant Office Leadership User Tips Hiring/Firing Gaming Console Millennials Hardware Data Protection Going Green Spyware VoIp Best Practices Data Breach Remote Monitoring Comparison Privacy Paperless Office Computers Dark Web Antivirus Ransomware Managed IT Services Quick Tips Business Cleaning Storage Alerts VoIP Analysis Email Big Data Entertainment Proactive IT Regulation Politics Internet Explorer Yahoo SaaS Passwords Law Enforcement Database Managed IT Services IT Support Phone System Human Resources Google Drive Lead Generation Paste Saving Money Telephone Systems Conferencing IT budget Mobile Device Telecommuting Website Artificial Intelligence Company Culture Remote Monitoring and Management Windows 7 Data loss Business Management Managed Service Technology Medical IT Payment Spam Printers Chrome Maintenance Data Recovery How To Downloads Access Tip of the week e-waste Chrome OS Updates Multi-Factor Security Access Control Operating System Security Spotify Bandwidth Compliance Emoji Productivity Cortana Congratulations HIPAA Thank You Content Filtering Avoiding Downtime Display Value Tablet Microsoft Office 365 Hosted Solution Healthcare Business Continuity Recovery Dark Data Smartphone Outlook Communications Authentication Credit Cards Solid State Drive Cabling Telephone System Data Management Apps Save Money Word Data Apple Password Profitability Office Tips Google Tech Term Customer Service Health Touchscreen Hacker Network Security Eliminating Downtime Twitter Gadgets Online Shopping Mobile Security Net Neutrality Windows XP Environment Microsoft Server Malware Wi-Fi Sales Mobile Device Management Printing Managed IT Tech Terms Office 365 Search Scalability Battery Education RAM Innovation Current Events Error Employees Hard Disk Drive Biometrics Hybrid Cloud SSD Shortcut Data Security Digital WiFi Technology Tips Money Windows Patch Management Wearables Smart Technology Upgrade Business Technology Financial WhatsApp Information Technology Safety Cybercrime BDR Holiday Telecommute Government Plug-In Marketing Movies iPhone Voice over Internet Protocol Miscellaneous Synergy Cloud Computing Video Games Computer Cables Troubleshooting Taskbar Windows 10 Networking Analytics Tip of the Week Managed Service Provider Authorization Wireless Internet Tactics Freedom of Information Users Training VPN Outsourced IT Amazon eCommerce Encryption Mobility Specifications App Edge Managed IT Service Excel Phishing Hosted Solutions Printer Google Maps Unified Communications Printer Server Automation IT Services BYOD Time Management IT Management Blockchain Employer Employee Relationship Recycling Voice over IP Personal Information Emergency Server Management Staffing OneNote Cost Management Employer-Employee Relationship Laptop Browser Vulnerabilities Bring Your Own Device Update GDPR Connectivity WannaCry User Security Business Intelligence Dongle E-Commerce Files Risk Management Social Media Remote Support Tech Support instant Messaging Batteries Help Desk User Tip