Alltech IT Solutions Blog

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Double Pulsar was, in essence, a tool that enabled a user to install programs (read: malware) on a targeted PC. The original version was only effective against 32-bit operating systems, but with the addition of the Chinese hacking tool, newer operating systems and 64-bit machines were suddenly vulnerable. Based on evidence that they have found, Symantec has formed a hypothesis that the tool was constructed after Chinese hackers analyzed the network traffic from an actual Double Pulsar attack.

Of course, this tool could have simply been stolen from an unsecured server. Regardless of where it came from, the precedent for tools being taken and warped into attack vectors is a dangerous one.

While the hacking group that utilized the Double Pulsar tool seems to no longer be active, this doesn’t mean that others can’t use it for their own ends. Having said that, the Chinese tool also leveraged a since-patched Windows vulnerability, which hopefully makes it a lame duck.

This is also far from the first time that NSA hacking tools have been co-opted by hackers. In 2017, a group known as the Shadow Brokers stole and shared a cache of hacking tools online...including the name Double Pulsar. This only goes to show that this threat isn’t new - and that proper network security is only that much more important. This is before we even consider the fact that state actors develop these kinds of tools very aggressively and take far more liberties than others.

What are your thoughts? Are you worried about state-sponsored tools being leveraged against your business? Discuss it in the comments, and don’t forget to reach out to us for assistance in securing your business’ network against threats like these. Give us a call at 954-628-3770 to learn more about what we can do.

Is it Wrong to Purchase Access to Your Own Data?
Tip of the Week: Windows 10 Taskbar Tips


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, June 06 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Microsoft Office 365 Outlook Co-Managed IT Employees Automation Apps Word Digital CrashOverride Windows Office Machine Learning Online Shopping Gaming Console Blockchain Reporting Data Data Security Office Tips Batteries Managed IT Service Updates Shortcut Remote Control User Security Customer Service Financial Social Network Network Security Processors Remote Monitoring IT budget Mobility Artificial Intelligence Remote Computing Value Hybrid Cloud Settings Security Phishing instant Messaging Password Software Lead Generation Risk Management Spyware SaaS Compliance Productivity Error Distribution Business Continuity Certification Access Hiring/Firing How To Managed Services Provider Remote Workers Access Control Employer-Employee Relationship Big Data Cybersecurity Chrome OS Alerts Mobile Cabling Gmail Touchscreen Smartphone Mobile Office IT Support Safety Office 365 Profitability Laptop Disaster Recovery BYOD Knowledge Healthcare Android Wireless Internet Managed IT VPN Management Going Green GDPR Business Privacy WannaCry Security Cameras Threats Scheduling Environment News Microsoft Data Management Politics Gadgets Spotify Telephone Systems Wearables Virtual Reality Small Business Users Entertainment Telecommuting OneNote Employee-Employer Relationship DDoS Conferencing Holiday WiFi Voice over IP Ink Microsoft Office Customer Relationship Management Hacking Smartphones Help Desk Antivirus Licensing Printer Tip of the week Hosted Solution Streaming Media Company Culture Multi-Factor Security Live Streaming Computer File Management Plug-In Excel Cryptocurrency Paperless Office Websites Hackers Printing Instagram iPhone Telecommute PowerPoint Health Server Management Applications Mobile Device Management Operating System VoIP Tech Terms Scalability Display Processor Internet Explorer Tactics Data Breach Video Games Microsoft Teams Humor Threat Mobile Devices National Security Business Technology Project Management Cybercrime Data Backup Database Paper Solid State Drive Information Battery Downloads e-waste Printer Server File Sharing Maintenance Workplace Tips Managed IT Services Payment Cards Inventory Virtual Private Network Hosted Solutions Virtualization Movies Tech Term Browser IT Services Analytics Google Net Neutrality Specifications Smart Technology disposal A.I. Payment Medical IT Dark Web Remote Cost Management Data Recovery Marketing Wireless Charging Telephone System Outsourced IT HP Business Computing VoIp Ransomware Virtual Assistant IT Support Authorization Time Management Bandwidth Edge Law Enforcement Recovery Communication Cloud Computing Windows 10 Insurance Current Events Scam Business Management Millennials Hard Disk Drive Managing Stress Internet of Things Government Personal Information Best Practices Copy Cleaning Network Retail Encryption Proactive IT Congratulations Troubleshooting Patch Management Workers Physical Security Cortana WhatsApp Wireless Trends Computer Care Fleet Management Data Protection Telephony Spam Education Phone System Budget E-Commerce Remote Support Tech Support Facebook Twitter Credit Cards Vendor Management Productivity Sports Efficiency Botnet User Tip Vendor Leadership Business Intelligence Webcam Staffing Upgrade Employer Employee Relationship Content Filtering Technology Communications Internet eCommerce User Tips IT Bring Your Own Device Collaboration Electronic Health Records Gadget Avoiding Downtime Video Covid-19 Printers Work/Life Balance Hardware Eliminating Downtime Synergy Search Passwords Voice over Internet Protocol BDR Memes Sales Dongle Files Scams Autocorrect Social Media HaaS Technology Tips Samsung Unified Communications Innovation Vulnerabilities Managed Service Connectivity Windows Server 2008 R2 The Internet of Things Hosted Desktop Paste Taskbar Money Chrome Router Bitcoin G Suite Recycling Information Technology Hard Drives Storage Emergency Staff Save Money Authentication IT Management Comparison SSD Document Management Freedom of Information Quick Tips Google Drive Emoji Server Windows 7 Dark Data Managed IT Services Alert Computers Training Mobile Device Backup Mobile Security Cloud IaaS Amazon Biometrics Thank You Backup and Disaster Recovery Cables App Remote Monitoring and Management Miscellaneous Network Attached Storage Email Management Benchmarks Update Human Resources Automobile Shadow IT Email Holidays Tip of the Week Windows 10 Yahoo eWaste Travel Networking HIPAA Spam Blocking Regulation Saving Money Google Maps Malware Television Analysis Profiles Hard Drive RAM Wi-Fi Data loss Firewall Hacker Virus Windows XP Vulnerability Worker Two-factor Authentication Unified Threat Management Apple Website Managed Service Provider Multi-Factor Authentication Tablet