Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a...  <--  <--- Return to Home Page
   Networked Database  [GNG] Gated, Filtered alt.comp.a...   [218 / 759] RSS
 From   To   Subject   Date/Time 
Message   Virus    All   NSA DoublePulsar malware has infected 36,000 computers   May 10, 2017
 12:06 AM *  

From: Virus Guy <Virus@Guy.C0M>

NSA DoublePulsar malware has infected 36,000 computers

http://techgenix.com/nsa-doublepulsar-malware...

A report by BleepingComputer's Catalin Cimpanu, using research from the
cybersecurity firm Below0Day, has identified a large number of
infections stemming from an NSA-developed malware downloader. Called
DoublePulsar, the malware was first identified in the most recent Shadow
Brokers dump of ôimplants.ö DoublePulsar functions as a malware and
exploit downloader. Once it infects a system, DoublePulsar then begins
to download and install various powerful strains of malware via
exploits. Such exploits created by the NSA that are found in
DoublePulsar include EternalBlue, EternalChampion, EternalSynergy,
EternalRomance, EmeraldThread, or EducatedScholar.

https://www.bleepingcomputer.com/news/securit...
ith-nsas-doublepulsar-malware/

These exploits target, as was pointed out by Cimpanu, SMB port 445
connections related to Microsoft Windows. Microsoft, to its credit, did
in fact release patches to block the NSA malware from utilizing
exploits. The problem is, however, that security researchers at
Below0Day discovered numerous computers already infected with
DoublePulsar.

To discover the DoublePulsar infection, Below0Day researchers scanned
roughly 5.5 million externally exposed SMB ports that, if their Windows
OS is unpatched, would be susceptible to the malware. Next, the team
took those IP addresses used in the initial scan and utilized a tool
created by Luke Jennings of Countercept. As explained by Jennings, the
tool is ôa set of python2 scripts for sweeping a list of IPs for the
presence of both SMB and RDP versions of the DoublePulsar implant.ö

https://github.com/countercept/doublepulsar-d...

Upon utilizing this tool, Below0Day uncovered over 36,000 computers that
had been infected with DoublePulsar. Of these 36,000-plus infections,
the majority of them were in the United States. See the below images
from Below0Day to find both an example of the scan results, as well as
an in-depth graph showing the countries most affected by DoublePulsar.

http://techgenix.com/tgwordpress/wp-content/u...
rt.jpg

(interestingly, none appear to be in Canada)

Some have taken me to task in my frequent critiques of government
hacking operations. As a journalist, I am used to calls of treason or,
as happened recently much to my amusement, being accused of working as a
Russian operative. At the end of the day, however, my strong critiques
stem from an InfoSec perspective.

As seen from empirical evidence, the various NSA hacking tools (in this
case DoublePulsar) have fallen into numerous hands, most certainly
including black-hat hackers. In its reckless deployment of malware that
nobody should have in their possession, the NSA has placed the entire
world at risk for a powerful set of cyberattacks. The NSA's main mission
is reconnaissance of all kinds, especially sensitive data (which is
obtained at all costs, civil liberties be damned).

With this in mind, imagine just how deeply compromised a system can
become if these tools fall into the wrong hands. While the NSA swears
that it is simply trying to protect the United States, the greatest
irony is that the majority of the 36,000 DoublePulsar infections were
based in America. I doubt this was the NSA's doing based on the IP
addresses used, but rather black hats who illegally obtained the
malware.

The NSA, and all other entities in the global intelligence community,
must rethink how they obtain information in the digital age.
--- NewsGate v1.0 gamma 2
 * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.1018 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.0.140505

Warning: Unknown: open(c:\Sessions\sess_4ce8gksd0536rthsje77frth11, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0 PHP Warning: session_start(): open(c:\Sessions\sess_4ce8gksd0536rthsje77frth11, O_RDWR) failed: No such file or directory (2) in D:\wc5\http\public\VADV\include\common.inc.php on line 45 PHP Warning: Unknown: open(c:\Sessions\sess_4ce8gksd0536rthsje77frth11, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 PHP Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0