Alltech IT Solutions Blog

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Double Pulsar was, in essence, a tool that enabled a user to install programs (read: malware) on a targeted PC. The original version was only effective against 32-bit operating systems, but with the addition of the Chinese hacking tool, newer operating systems and 64-bit machines were suddenly vulnerable. Based on evidence that they have found, Symantec has formed a hypothesis that the tool was constructed after Chinese hackers analyzed the network traffic from an actual Double Pulsar attack.

Of course, this tool could have simply been stolen from an unsecured server. Regardless of where it came from, the precedent for tools being taken and warped into attack vectors is a dangerous one.

While the hacking group that utilized the Double Pulsar tool seems to no longer be active, this doesn’t mean that others can’t use it for their own ends. Having said that, the Chinese tool also leveraged a since-patched Windows vulnerability, which hopefully makes it a lame duck.

This is also far from the first time that NSA hacking tools have been co-opted by hackers. In 2017, a group known as the Shadow Brokers stole and shared a cache of hacking tools online...including the name Double Pulsar. This only goes to show that this threat isn’t new - and that proper network security is only that much more important. This is before we even consider the fact that state actors develop these kinds of tools very aggressively and take far more liberties than others.

What are your thoughts? Are you worried about state-sponsored tools being leveraged against your business? Discuss it in the comments, and don’t forget to reach out to us for assistance in securing your business’ network against threats like these. Give us a call at 954-628-3770 to learn more about what we can do.

Is it Wrong to Purchase Access to Your Own Data?
Tip of the Week: Windows 10 Taskbar Tips
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Current Events Website Managed IT Services Samsung Laptop Word eCommerce Net Neutrality Entertainment Outlook Apps Social Media Server Synergy Edge Google Education Paper Gadgets Travel Alerts Printer Server Information Technology Cortana Windows File Sharing Regulation Bring Your Own Device Company Culture Microsoft Conferencing Best Practices Business Technology Plug-In Alert Healthcare Scam Software BDR Authentication Mobile Devices Specifications How To Cybercrime User Security HaaS Passwords Browser Office Tips Compliance Database Streaming Media Content Filtering Leadership Office Cost Management Twitter Artificial Intelligence Tip of the week Bandwidth Microsoft Teams IT Support Tip of the Week Processors disposal BYOD Instagram Processor Cabling Unified Threat Management Chrome Saving Money Backup and Disaster Recovery Spyware Smartphone Physical Security Hard Disk Drive Retail Users National Security Time Management Hackers Computer IT Services instant Messaging Shortcut News Yahoo Video Games Productivity Freedom of Information Router Tech Terms Spam Smart Technology GDPR Gmail Communications The Internet of Things Webcam Quick Tips Productivity Movies Knowledge Workers Medical IT Hosted Solution Remote Monitoring RAM Managed Service Efficiency Settings Wi-Fi Windows XP WannaCry Access Botnet Taskbar Threat Security Cameras Employer-Employee Relationship Save Money Miscellaneous Congratulations Data Protection Managing Stress Vulnerabilities Hard Drives App Employees User Tip Printer VPN HIPAA Dark Web Politics Information Benchmarks eWaste Data loss Search Training Hiring/Firing Recovery Cables Networking Two-factor Authentication Server Management Ransomware Big Data Google Drive Patch Management VoIp Certification Windows Server 2008 R2 Apple Network Employer Employee Relationship Phishing Hosted Solutions Data Breach Troubleshooting Customer Service e-waste Data Security Digital WhatsApp IT budget Analysis Computers Remote Computing Battery Data Management Maintenance Outsourced IT Spotify Dark Data Upgrade Hacking Display Paste Wireless Internet Law Enforcement Internet Explorer Remote Monitoring and Management Managed IT Services Downloads Safety Multi-Factor Security Biometrics Emergency Wireless Vulnerability Human Resources Payment Touchscreen Remote Control Collaboration Remote Support Managed IT Service Business Continuity Tech Support Workplace Tips Ink Cryptocurrency Television Email Management Facebook Windows 10 Unified Communications Document Management Solid State Drive Mobile Device Management Cleaning Personal Information Encryption DDoS Automation Proactive IT Cybersecurity Small Business Live Streaming Printers Chrome OS Mobile Security Staffing Innovation Sales Microsoft Office Cloud Data Recovery Automobile Scheduling Applications Privacy HP Managed Service Provider Thank You Government Business Intelligence Dongle Smartphones Internet of Things Avoiding Downtime IT Support Wearables Scalability Technology Tips Voice over IP Office 365 Risk Management WiFi Data Backup Business Money Technology IT Management CrashOverride Excel SSD Communication Authorization Internet Eliminating Downtime Telecommute Disaster Recovery Tablet Electronic Health Records Computer Care Virtualization Microsoft Office 365 Comparison E-Commerce Machine Learning Business Management Gaming Console Budget Sports Credit Cards Managed IT Windows 10 Amazon Spam Blocking Analytics Windows 7 Wireless Charging Hardware Marketing Health Hard Drive Mobile Device Updates Work/Life Balance Paperless Office Password Telephone System Phone System Malware Files Telephony Security iPhone Autocorrect Tech Term SaaS Business Computing Profitability Cloud Computing User Tips Emoji Help Desk Online Shopping Inventory Reporting Lead Generation Update Antivirus Hacker Telecommuting Video VoIP OneNote Mobility Android Network Security Trends Storage Websites Google Maps Vendor Management Backup G Suite Blockchain Access Control Gadget Environment Virtual Assistant Worker Printing Network Attached Storage A.I. Connectivity PowerPoint IaaS Holiday Telephone Systems Value Voice over Internet Protocol Employee-Employer Relationship Copy Millennials Staff Error Hybrid Cloud Licensing Operating System Data Virus Tactics Email