Blog
home
  • Register

Data Net Blog

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Double Pulsar was, in essence, a tool that enabled a user to install programs (read: malware) on a targeted PC. The original version was only effective against 32-bit operating systems, but with the addition of the Chinese hacking tool, newer operating systems and 64-bit machines were suddenly vulnerable. Based on evidence that they have found, Symantec has formed a hypothesis that the tool was constructed after Chinese hackers analyzed the network traffic from an actual Double Pulsar attack.

Of course, this tool could have simply been stolen from an unsecured server. Regardless of where it came from, the precedent for tools being taken and warped into attack vectors is a dangerous one.

While the hacking group that utilized the Double Pulsar tool seems to no longer be active, this doesn’t mean that others can’t use it for their own ends. Having said that, the Chinese tool also leveraged a since-patched Windows vulnerability, which hopefully makes it a lame duck.

This is also far from the first time that NSA hacking tools have been co-opted by hackers. In 2017, a group known as the Shadow Brokers stole and shared a cache of hacking tools online...including the name Double Pulsar. This only goes to show that this threat isn’t new - and that proper network security is only that much more important. This is before we even consider the fact that state actors develop these kinds of tools very aggressively and take far more liberties than others.

What are your thoughts? Are you worried about state-sponsored tools being leveraged against your business? Discuss it in the comments, and don’t forget to reach out to us for assistance in securing your business’ network against threats like these. Give us a call at (760) 466-1200 to learn more about what we can do.

Is it Wrong to Purchase Access to Your Own Data?
Tip of the Week: Windows 10 Taskbar Tips
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 21, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Productivity Network Security Malware Privacy Communication User Tips Microsoft Google Data Tech Term Internet Efficiency Smartphones Hardware Hackers Mobile Device IT Support Windows 10 Email Cybersecurity Ransomware Software Communications Android Computer Innovation Cloud Users Network Browser VoIp Mobile Devices Passwords Managed IT Services Business Management Business Small Business Outsourced IT Collaboration Cloud Computing Wi-Fi Applications Hosted Solutions Social Media IT Services Smartphone Workplace Tips Holiday Data recovery Managed IT services Information Chrome Data Backup Miscellaneous Employer-Employee Relationship Microsoft Office Internet of Things Backup Bandwidth Wireless Apps Blockchain Patch Management Saving Money Upgrade Access Control Networking Save Money Gmail Laptop Marketing Gadgets Word Value Compliance Cortana Business Intelligence Router Wireless Charging Physical Security Phishing Government Remote Computing Tech Terms Cost Management G Suite Computers Facebook Automation Office Virtual Assistant Managed IT Service Virtualization Excel Healthcare Net Neutrality Processor RAM Artificial Intelligence Scam Data Breach Remote Monitoring and Management Office 365 Password Data Protection Data Security Mobility Medical IT Telephony Paperless Office Connectivity Company Culture VPN Managed Service BDR How To Voice over Internet Protocol Virus Data Management Time Management Managing Stress Telecommute Hard Drive Live Streaming Business Continuity Windows Ink SSD Retail Microsoft Office 365 Conferencing Lead Generation Tech Support Customer Service Maintenance Plug-In Telephone System Payment Health BYOD Safety Wearables Streaming Media Storage Chrome OS Troubleshooting Data loss Processors Updates PowerPoint eCommerce Remote Support Unified Communications Authentication Database Alert Vulnerability OneNote Internet Explorer Proactive IT Big Data Technology Tips Cleaning instant Messaging Environment Employees Edge Wireless Internet Law Enforcement Telecommuting Downloads Dark Web Network Attached Storage Bring Your Own Device HP Update Spam User Tip Spyware Certification Sports Reporting IT budget Twitter Sales Online Shopping Authorization Cybercrime Content Filtering Windows Server 2008 R2 Threat Vulnerabilities Error e-waste Server Apple Solid State Drive Amazon Dongle Trends Human Resources Hybrid Cloud Document Management Outlook Antivirus Congratulations Display Inventory Tablet Settings Microsoft Teams Machine Learning Tactics WannaCry Travel Taskbar Printing Backup and Disaster Recovery User Security Botnet Cryptocurrency A.I. disposal Comparison iPhone Hard Disk Drive Workers Personal Information Employee-Employer Relationship Cables Profitability Staff Tip of the week WhatsApp Training Benchmarks SaaS IT Management Mobile Security Website Windows 7 HIPAA Education Help Desk National Security Paper Hard Drives Business Technology Voice over IP Remote Monitoring Movies Touchscreen Server Management Specifications Licensing Video Analytics File Sharing Millennials News E-Commerce Electronic Health Records Digital Eliminating Downtime Websites Security Cameras GDPR Operating System Knowledge Battery Printers WiFi Regulation Thank You Quick Tips Analysis Disaster Recovery Risk Management

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123