BNMC Blog

NSA-Developed Malware Used in Third-Party Hack

NSA-Developed Malware Used in Third-Party Hack

Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium in 2016. Needless to say, this threat is unnerving.

Double Pulsar could be used to install additional malware on a target PC. At the time the threat could only be leveraged against 32-bit operating systems, but the Chinese-hacked tool struck later in the year versus 64-bit machines and newer operating systems. Symantec has found evidence that this threat was utilized, hypothesizing that the Chinese hackers built the tool after analyzing network traffic during a legitimate Double Pulsar attack.

The possibility that the hackers discovered the threat through a different vector exists, such as stealing the threat from an unsecured server, but the fact remains that this sets a dangerous precedent for tools like these being taken and used against their intentions.

It’s noteworthy to mention that the hacking group that utilized Double Pulsar is no longer active, but this shouldn’t mitigate the risks associated with it--especially since the tool is still out there for use by other threat actors. Thankfully, the Chinese tool also took advantage of a Windows vulnerability that has since been patched… so there’s that.

This isn’t the first time that hacking tools utilized by the NSA were stolen and utilized by hackers. In 2017, a group called the Shadow Brokers stole and dumped several hacking tools online, which is where the name Double Pulsar was originally discovered. If anything, the revelation that this threat existed at some point in the past only further exacerbates the need for proper network security--especially state actors that take more liberties with the development of these types of tools.

What are your thoughts on these developments and the possibility that these threats could be used to attack organizations like yours in the future? Let us know in the comments and be sure to ask us how you can secure your network from these threats. We have all kinds of tools at our disposal that can keep your business safe from harm. Call us today at 978-482-2020 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, June 19 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Computing User Tips Network Security Google Malware Hackers Productivity Business Microsoft Software Computer Hosted Solutions Tech Term Ransomware Communication Data Internet IT Services Efficiency Mobile Devices Small Business Workplace Tips Cloud Computing Backup Data Recovery Hardware IT Support Smartphone Innovation Android Saving Money Business Continuity Managed IT Services Microsoft Office Browser Managed IT Services Windows Internet of Things Information Data Backup Data Management Users Mobile Device Social Media Windows 10 Business Management Windows 10 Passwords Productivity Server Word Facebook Outsourced IT Phishing Vulnerability Upgrade Cybersecurity App Office 365 Gmail Smartphones Chrome Remote Monitoring communications Artificial Intelligence Disaster Recovery Network Encryption IT Support Money VoIP Managed Service Tip of the week Gadgets Managed Service Provider Save Money Employer-Employee Relationship Miscellaneous Virtual Reality Analytics Applications Website Infrastructure BYOD Big Data Company Culture Employee-Employer Relationship Display Maintenance Settings Robot Antivirus Google Drive Bandwidth Automation Content Filtering Apps YouTube Education Access Control Apple VPN Risk Management IT Management Paperless Office Office Tips Government Router Unified Threat Management Hacker Data storage Telephone Systems Retail Alert desktop Augmented Reality Spam Computing Downtime Outlook Firewall WiFi Two-factor Authentication Managing Stress Bring Your Own Device Operating System Avoiding Downtime Monitors LiFi Vendor Management Scam Chromebook Hosted Solution Development Document Management Administration Solid State Drive Mouse Wireless Networking End of Support HIPAA Hard Disk Drive Mobile Security Data Security Storage Printing Server Management Business Technology SaaS Touchscreen Business Intelligence Virtual Private Network Quick Tips Computers Virtualization Laptop Holiday The Internet of Things Tablet Data loss Language Value Mobile Device Management Downloads Regulations Deep Learning Scalability Mail Merge Blockchain VoIP Unified Threat Management Mirgation Recycling Managed Services Shortcut Distributed Denial of Service Politics IoT Digital Payment Customer Service Cybercrime K-12 Schools Disaster Device Bluetooth Comparison Cookies MSP Digital Alt Codes Mixed Reality Firefox Superfish Computing Infrastructure Professional Services Collaboration LED Office Samsung Marketing Social Networking Migration Address Permissions Private Cloud Social PowerPoint User Error Chatbots eWaste Budget Laptops Patch Management Managed IT Service Tech Support Star Wars Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Information Technology Mobility Specifications Nanotechnology Spyware Typing Humor Data Breach Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Best Practice Onboarding Time Management Printer Halloween Identity Continuity Software as a Service Break Fix Websites Fraud Cost Management Smart Office Print Toner Search Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives Licensing Dongle IT solutions Going Green Content Servers Google Calendar Safety Wires Training Corporate Profile Google Docs Messaging Emergency Automobile Hacks Digital Signage Network Management Remote Computing Scary Stories Solar G Suite Entertainment Dark Web Assessment Solid State Drives Network Congestion Running Cable Work Dell Google Wallet Shortcuts Cyber Monday Smart Tech Bitcoin Monitoring Cooperation Service Level Agreement Cabling Streaming Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Google Maps Password Troubleshooting SharePoint Writing Sports Compliance Legal iOS Microsoft Excel Wi-Fi Virtual Desktop Hotspot Internet Exlporer Spying National Security Techology IT Technicians Optimization Unified Communications Drones Security Cameras Managed IT Smart Technology Connectivity Windows 8 Dark Data Update Staff Leominster Human Error Statistics Modem FinTech Analysis Students How To Lenovo Printers IT Consultant Computer Repair Relocation Updates Cameras Mobile Data Recovery Meetings How To Work/Life Balance Tracking Mobile Computing Cleaning Health Black Market CCTV Webcam Law Enforcement Notifications Windows 7 Electronic Medical Records Twitter Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing BDR Personal Information Botnet Cortana 3D Printing Regulation Supercomputer CrashOverride Motion Sickness Staffing Administrator Processors Taxes Machine Learning Web Server what was your? Unsupported Software IT Budget GPS

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3