Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/teroit/public_html/templates/risen_hope/vertex/responsive/responsive_mobile_menu.php on line 158

Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/teroit/public_html/templates/risen_hope/vertex/s5flex_menu/helpers.php on line 151
  • Register

Texas Professional IT Services LLC Blog

Texas Professional IT Services LLC has been serving the Baytown area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hack Enabled by NSA-Developed Tool

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016.

Double Pulsar was, in essence, a tool that enabled a user to install programs (read: malware) on a targeted PC. The original version was only effective against 32-bit operating systems, but with the addition of the Chinese hacking tool, newer operating systems and 64-bit machines were suddenly vulnerable. Based on evidence that they have found, Symantec has formed a hypothesis that the tool was constructed after Chinese hackers analyzed the network traffic from an actual Double Pulsar attack.

Of course, this tool could have simply been stolen from an unsecured server. Regardless of where it came from, the precedent for tools being taken and warped into attack vectors is a dangerous one.

While the hacking group that utilized the Double Pulsar tool seems to no longer be active, this doesn’t mean that others can’t use it for their own ends. Having said that, the Chinese tool also leveraged a since-patched Windows vulnerability, which hopefully makes it a lame duck.

This is also far from the first time that NSA hacking tools have been co-opted by hackers. In 2017, a group known as the Shadow Brokers stole and shared a cache of hacking tools online...including the name Double Pulsar. This only goes to show that this threat isn’t new - and that proper network security is only that much more important. This is before we even consider the fact that state actors develop these kinds of tools very aggressively and take far more liberties than others.

What are your thoughts? Are you worried about state-sponsored tools being leveraged against your business? Discuss it in the comments, and don’t forget to reach out to us for assistance in securing your business’ network against threats like these. Give us a call at (832) 514-6260 to learn more about what we can do.

Is it Wrong to Purchase Access to Your Own Data?
Tip of the Week: Windows 10 Taskbar Tips
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, November 24, 2024

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520