By accepting you will be accessing a service provided by a third-party external to

NSA-Developed Malware Used in Third-Party Hack

NSA-Developed Malware Used in Third-Party Hack

Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium in 2016. Needless to say, this threat is unnerving.

Double Pulsar could be used to install additional malware on a target PC. At the time the threat could only be leveraged against 32-bit operating systems, but the Chinese-hacked tool struck later in the year versus 64-bit machines and newer operating systems. Symantec has found evidence that this threat was utilized, hypothesizing that the Chinese hackers built the tool after analyzing network traffic during a legitimate Double Pulsar attack.

The possibility that the hackers discovered the threat through a different vector exists, such as stealing the threat from an unsecured server, but the fact remains that this sets a dangerous precedent for tools like these being taken and used against their intentions.

It’s noteworthy to mention that the hacking group that utilized Double Pulsar is no longer active, but this shouldn’t mitigate the risks associated with it--especially since the tool is still out there for use by other threat actors. Thankfully, the Chinese tool also took advantage of a Windows vulnerability that has since been patched… so there’s that.

This isn’t the first time that hacking tools utilized by the NSA were stolen and utilized by hackers. In 2017, a group called the Shadow Brokers stole and dumped several hacking tools online, which is where the name Double Pulsar was originally discovered. If anything, the revelation that this threat existed at some point in the past only further exacerbates the need for proper network security--especially state actors that take more liberties with the development of these types of tools.

What are your thoughts on these developments and the possibility that these threats could be used to attack organizations like yours in the future? Let us know in the comments and be sure to ask us how you can secure your network from these threats. We have all kinds of tools at our disposal that can keep your business safe from harm. Call us today at 978-482-2020 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 05 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Network Security Email Hosted Solutions Microsoft Hackers Computer Software Business Efficiency Malware Communication Data Google Small Business Workplace Tips IT Services Mobile Devices IT Support Cloud Computing Hardware Tech Term Internet Managed IT Services Data Recovery Backup Ransomware Innovation Outsourced IT Users Smartphone Android Saving Money Mobile Device Windows Smartphones Upgrade Data Backup Miscellaneous Phishing communications Information Microsoft Office Browser Business Continuity Disaster Recovery VoIP Business Management Windows 10 Server Facebook Office 365 Managed IT Services Social Media Network Cybersecurity Productivity Windows 10 Passwords Data Management Internet of Things Word Gmail Vulnerability Remote Monitoring App Gadgets Artificial Intelligence Encryption Quick Tips Mobile Office Infrastructure Chrome Apps Managed Service Tip of the week Analytics Remote Workers Employer-Employee Relationship Networking BYOD Website VPN IT Support Access Control Money Applications Router Information Technology Save Money Company Culture Settings Virtual Reality Managed Service Provider Maintenance Education Collaboration Firewall Apple Storage Avoiding Downtime Development Government Antivirus YouTube Computers Hacker Data storage HIPAA Risk Management BDR Office Tips Display IT Management Data Security Paperless Office WiFi Virtual Private Network Robot Big Data Unified Threat Management Google Drive Bandwidth Automation Content Filtering Employee-Employer Relationship Managing Stress Remote Computing Two-factor Authentication Managed IT Service OneNote SaaS Document Management Data Breach Customer Relationship Management Scam Printing Wi-Fi Windows 7 Password IT Software as a Service Break Fix Social Network Virtualization Wireless Holiday Solid State Drive Search Training Retail Alert Hard Disk Drive Mobile Security Outlook Spam Computing Laptop Business Technology Server Management Bring Your Own Device Operating System The Internet of Things iOS Social Monitors Touchscreen LiFi Vendor Management Business Intelligence Managed IT Humor Chromebook Hosted Solution Data loss Administration Best Practice Tablet Conferencing Telephone Systems Downtime Mouse Managed Services End of Support Marketing desktop MSP Going Green Augmented Reality Social Networking Migration Consulting Address Hacks Permissions Memes Computing Infrastructure Professional Services LED Threats Laptops Patch Management Bitcoin Network Congestion Star Wars PowerPoint User Error Google Wallet Chatbots eWaste Specifications Nanotechnology Spyware Halloween Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Business Growth Motherboard Cables Computer Care IBM Writing Alerts USB File Sharing Co-Managed IT Heating/Cooling Multi-Factor Security Legal Managed Services Provider Windows 8 Fraud Cost Management Onboarding GDPR Time Management Unified Communications Printer Drones Identity Continuity Black Friday Dark Data Update Screen Reader Charging Identity Theft Scary Stories Slack Hard Disk Drives COVID-19 Smart Office Print Toner Myths Wires Corporate Profile Running Cable Messaging Emergency Mobile Device Management Holidays Licensing Dongle Content Huawei Servers Deep Learning Google Calendar Entertainment Vendor Dark Web Distribution Assessment Automobile Buisness Digital Signage Data Warehouse Network Management Politics Solar G Suite Alt Codes Cyber Monday Customer Service Smart Tech Sports Monitoring Solid State Drives Remote Work Work/Life Balance Work Dell Virtual Desktop Shortcuts Mobile Management Health Private Cloud Voice over Internet Protocol WannaCry Employee-Employer Relationships Payment Card Office Cooperation Samsung Service Level Agreement Cabling Streaming Processor Legislation Hybrid Cloud Microsoft Excel Logistics Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Budget Compliance Tech Support Security Cameras Profiles Typing Smart Technology Connectivity Spying National Security Techology IT Technicians Optimization Modem FinTech Analysis Students How To Lenovo Current Events Inventory Social Engineering Staff Leominster Human Error Memory Statistics Cybercrime Scalability Mail Merge Blockchain Asset Management Language Value Virus Downloads Regulations Websites Utility Computing Shortcut Cryptocurrency Distributed Denial of Service IoT Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Cookies Digital Mixed Reality Firefox IT solutions Superfish Shadow IT Safety K-12 Schools Disaster Device Reducing Cost Bluetooth Comparison Google Docs Personal Information Botnet Cleaning Cortana 3D Printing CCTV Webcam Machine Learning Processors Financial Error Unsupported Software Point of Sale Ben McDonald shares Computer Repair Relocation Travel Mobile Data Recovery Regulation Supercomputer CrashOverride How To Staffing Mobile Computing Motion Sickness Taxes Black Market Administrator IT Budget Law Enforcement Web Server what was your? Electronic Medical Records GPS Notifications IT Consultant Twitter Printers Physical Security Emoji Upgrades Gadget Cameras Tracking Crowdsourcing Meetings

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3