Out of the Box Solutions Blog

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Double Pulsar was, in essence, a tool that enabled a user to install programs (read: malware) on a targeted PC. The original version was only effective against 32-bit operating systems, but with the addition of the Chinese hacking tool, newer operating systems and 64-bit machines were suddenly vulnerable. Based on evidence that they have found, Symantec has formed a hypothesis that the tool was constructed after Chinese hackers analyzed the network traffic from an actual Double Pulsar attack.

Of course, this tool could have simply been stolen from an unsecured server. Regardless of where it came from, the precedent for tools being taken and warped into attack vectors is a dangerous one.

While the hacking group that utilized the Double Pulsar tool seems to no longer be active, this doesn’t mean that others can’t use it for their own ends. Having said that, the Chinese tool also leveraged a since-patched Windows vulnerability, which hopefully makes it a lame duck.

This is also far from the first time that NSA hacking tools have been co-opted by hackers. In 2017, a group known as the Shadow Brokers stole and shared a cache of hacking tools online...including the name Double Pulsar. This only goes to show that this threat isn’t new - and that proper network security is only that much more important. This is before we even consider the fact that state actors develop these kinds of tools very aggressively and take far more liberties than others.

What are your thoughts? Are you worried about state-sponsored tools being leveraged against your business? Discuss it in the comments, and don’t forget to reach out to us for assistance in securing your business’ network against threats like these. Give us a call at 800-750-4OBS (4627) to learn more about what we can do.

Is it Wrong to Purchase Access to Your Own Data?
Tip of the Week: Windows 10 Taskbar Tips
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Privacy Communication Malware Microsoft Efficiency Data Tech Term Google Internet Mobile Device Hardware Smartphones Innovation Ransomware Windows 10 Hackers IT Support Computer Email Cybersecurity Android Users Passwords Small Business Browser Software Cloud Communications Mobile Devices Business Managed IT Services Business Management Network IT Services Workplace Tips Applications Outsourced IT Collaboration Cloud Computing Managed IT services Employer-Employee Relationship Information Data recovery Internet of Things VoIp Wi-Fi Apps Bandwidth Backup Wireless Saving Money Data Backup Holiday Social Media Hosted Solutions Smartphone Miscellaneous Microsoft Office Upgrade Gmail Networking Business Intelligence Blockchain Marketing Value Gadgets Managed Service Save Money Laptop RAM Virtual Assistant Password Cortana Analytics Wireless Charging Access Control Telephony Medical IT Virtualization Chrome VPN Connectivity Company Culture Processor Facebook Healthcare Data Management Mobility Computers Cost Management Managed IT Service Data Security Tech Terms Compliance Remote Computing Voice over Internet Protocol Net Neutrality Patch Management Automation Office Paperless Office G Suite Artificial Intelligence Office 365 BDR Remote Monitoring and Management Content Filtering Data Protection Storage E-Commerce Phishing Safety Threat Windows Profitability Trends Reporting Word Tactics Customer Service Employee-Employer Relationship Digital Data loss Comparison Hard Drives Online Shopping User Tip disposal Bring Your Own Device Time Management Vulnerability Machine Learning Mobile Security Microsoft Teams Dark Web Payment Data Breach Printing Updates Amazon Eliminating Downtime SSD A.I. Wearables IT Management Workers OneNote Electronic Health Records Spam Specifications Analysis Certification Employees Hybrid Cloud Authentication Spyware Voice over IP Operating System Error instant Messaging WannaCry Server Management Sales Dongle Paper BYOD Big Data Movies SaaS Server Millennials Maintenance Windows Server 2008 R2 Troubleshooting Health Edge Virus Settings Solid State Drive Cables Authorization Chrome OS HP Technology Tips Managing Stress Vulnerabilities HIPAA Tablet Ink Display Plug-In Wireless Internet Conferencing Twitter GDPR Business Technology Router Taskbar Update Antivirus Training IT budget Database Hard Disk Drive Document Management Telecommute Streaming Media Physical Security Environment Touchscreen Cryptocurrency Hard Drive Excel Government PowerPoint Benchmarks Proactive IT Help Desk Inventory Unified Communications Personal Information Lead Generation Network Attached Storage Websites Internet Explorer National Security Outlook Staff Security Cameras Battery Telecommuting Cybercrime Video Human Resources Backup and Disaster Recovery Downloads eCommerce Tip of the week e-waste Microsoft Office 365 Windows 7 Processors Knowledge Sports Business Continuity Alert Printers Quick Tips Regulation Disaster Recovery Risk Management