• Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Double Pulsar was, in essence, a tool that enabled a user to install programs (read: malware) on a targeted PC. The original version was only effective against 32-bit operating systems, but with the addition of the Chinese hacking tool, newer operating systems and 64-bit machines were suddenly vulnerable. Based on evidence that they have found, Symantec has formed a hypothesis that the tool was constructed after Chinese hackers analyzed the network traffic from an actual Double Pulsar attack.

Of course, this tool could have simply been stolen from an unsecured server. Regardless of where it came from, the precedent for tools being taken and warped into attack vectors is a dangerous one.

While the hacking group that utilized the Double Pulsar tool seems to no longer be active, this doesn’t mean that others can’t use it for their own ends. Having said that, the Chinese tool also leveraged a since-patched Windows vulnerability, which hopefully makes it a lame duck.

This is also far from the first time that NSA hacking tools have been co-opted by hackers. In 2017, a group known as the Shadow Brokers stole and shared a cache of hacking tools online...including the name Double Pulsar. This only goes to show that this threat isn’t new - and that proper network security is only that much more important. This is before we even consider the fact that state actors develop these kinds of tools very aggressively and take far more liberties than others.

What are your thoughts? Are you worried about state-sponsored tools being leveraged against your business? Discuss it in the comments, and don’t forget to reach out to us for assistance in securing your business’ network against threats like these. Give us a call at (760) 466-1200 to learn more about what we can do.

Is it Wrong to Purchase Access to Your Own Data?
Tip of the Week: Windows 10 Taskbar Tips


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 31, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Malware Innovation IT Support Hackers Communication Smartphones User Tips Small Business Google Hardware Email Microsoft VoIp Software Communications Cloud Computer Workplace Tips Tech Term Managed IT Services Users Internet Mobile Device Business Management Cybersecurity Android Outsourced IT Collaboration Windows 10 Ransomware Mobile Devices Business Backup Miscellaneous Hosted Solutions Cloud Computing Passwords Social Media IT Services Upgrade Apps Network Wi-Fi Data recovery Information Browser Data Backup Saving Money Phishing Managed Service Bandwidth Holiday Microsoft Office Facebook Gadgets Applications Smartphone Networking Internet of Things Windows Access Control Chrome VPN BDR Managed IT services Blockchain Employer-Employee Relationship Gmail Patch Management Marketing Wireless Compliance Router Value Going Green Apple Managed IT Service Business Intelligence Mobile Office Word Automation Quick Tips Save Money Laptop Health Social Network Excel Voice over Internet Protocol Paperless Office Cortana Conferencing Wireless Charging Scam Data Breach Government Remote Computing Healthcare Net Neutrality Data Management Processor G Suite Office Virtual Assistant Virtualization Data Security Tech Terms Cost Management iPhone Mobility Computers Bring Your Own Device Office 365 Remote Monitoring RAM Server Education Remote Monitoring and Management Data Protection Batteries Settings Employee-Employer Relationship Windows 7 How To Virus Medical IT Telephony Retail Artificial Intelligence Password Telephone System Physical Security Business Continuity Connectivity Business Technology Company Culture Disaster Recovery Payment Cards Cleaning Movies Virtual Reality Touchscreen Knowledge Battery disposal Alert Vulnerability Wearables Chrome OS File Management IT Management Mobile Security Eliminating Downtime Hard Drive Updates Staff Shadow IT GDPR Hard Drives Managing Stress Lead Generation OneNote Ink Memes instant Messaging Threats Remote Microsoft Office 365 Employees Distribution Server Management Maintenance Virtual Private Network Plug-In Analytics eCommerce Current Events Operating System BYOD Processors Certification Digital Websites Streaming Media Computer Repair Storage SSD Troubleshooting Windows Server 2008 R2 Telecommute Congratulations PowerPoint IT Vulnerabilities Scams Botnet Unified Communications Remote Workers Authentication Solid State Drive Fleet Management Travel Internet Explorer Customer Relationship Management Proactive IT Law Enforcement Telecommuting Recycling Sales Online Shopping Human Resources Wireless Internet User Tip Spyware Display Safety Downloads IT Service Dark Web Project Management Website Update Content Filtering Taskbar Data loss WhatsApp Sports Hosted Desktop Reporting Cryptocurrency Covid-19 Authorization Hard Disk Drive Multi-Factor Authentication Database Threat Managed Service Provider Personal Information Big Data Technology Tips Tablet Managed Services Provider Network Attached Storage Environment Licensing Amazon Training Benchmarks Edge News Trends Mobile Error Search IT budget Twitter Hybrid Cloud Outlook WannaCry Help Desk National Security HP Spam Firewall User Security Microsoft Teams Comparison Video Mobile Device Management Cybercrime Live Streaming Printing Co-Managed IT Workers E-Commerce Bitcoin A.I. Recovery Electronic Health Records Vendor e-waste Tech Support Tip of the week Security Cameras Risk Management Dongle Time Management Insurance Inventory Cables Profitability HIPAA Document Management Antivirus Profiles SaaS Voice over IP Backup and Disaster Recovery Remote Support Specifications Customer Service Holidays Machine Learning Tactics Paper Humor File Sharing Millennials Payment Financial Printers Thank You Regulation Analysis WiFi

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123