Leaked NSA Spying Tools Puts Windows Server At Risk
Caezar SottoA mysterious hacking group has recently leaked what seems to be the NSA's suspected spying tools. The cyber weapons (which are now available to the public) shows how vulnerable older Windows Servers really are.
On Friday, the Shadow Brokers leaked the files online. Setting off a ripple effect for concerned tech experts that are now worried about the discovery. According to PCWorld, concerns for cyber criminals incorporating the tools in their hacks is becoming apparent.
Matthew Hickey, the director of online security provider Hacker House believes that the "leak puts state tools into the hands of anyone."
His dissection of the NSA tools revealed 20 different Windows exploits, including four which appear to support previously unknown software vulnerabilities.
A post by ZDNet states that each exploit works as a program that takes advantage of a security flaw. Furthermore, researchers are still examining the leaked files.
Windows systems that are affected by the alleged NSA tools include older versions of the OS, including NT, XP and the Windows 7. Moreover, computers running Windows Server are in a bigger risk.
The exploits are designed to leverage vulnerabilities in a workstation's online server functions. Hickey added that one exploit called the "Eternalblue" could remotely cause older versions of Windows to execute code.
He demonstrated this against a computer running Windows Server 2008 R2 SP1. Surprisingly, he pulled off the hack in less than two minutes. He continued that an "attacker can use these tools to hack into Windows computers and run their code for future attacks."
For instance, a hacker could open a backdoor channel into the machine to upload ransomware or steal sensitive data. The bigger dilemma lies in the latest version of Windows Server that rolled out last year.
On Friday Microsoft stated that it was still studying the exploits. Amol Sarwate, director of engineering for Qualys, said that computers behind a firewall should be safe. He said the vulnerable systems "should consider disabling certain functions that the exploits use."
most read
related stories
more stories from News
Google teases a new AI camera feature ahead of I/O 2024, offering real-time contextual recognition and voice interaction on Pixel devices. Discover how this innovative technology enhances your mobile experience.
ernest hamiltonDiscover the latest insights into Apple's highly anticipated iPhone 16 Pro, from its innovative display and camera advancements to powerful performance and software integration. Stay informed as anticipation builds for the official unveiling.
ernest hamiltonDiscover how a groundbreaking breakthrough in phononics is poised to revolutionize wireless technology, making devices smaller and more efficient. Explore the potential of giant phononic nonlinearities and their implications for consumer electronics. Dive into the future of connectivity today!
ernest hamiltonExplore the potential impact of Apple's collaboration with OpenAI on iOS 18. From enhanced messaging to smarter voice assistants, dive into the future of AI-powered experiences. Stay informed—read on
ernest hamiltonDiscover innovative post ideas and expert tips to engage your audience and drive sales. Read now and make this Mother's Day unforgettable!
ernest hamiltonUnveiling OnePlus' controversial move! Are they really sneaking unwanted apps onto their latest flagship phones? Read now for all the details about this bloatware!"
ernest hamiltonDiscover the ultimate arsenal of digital tools for modern moms! Explore this curated list of 10 essential smartphone apps designed to simplify parenting tasks, organizing schedules, tracking developmental milestones and discovering family-friendly activities.
ernest hamiltonDiscover the latest Google Pixel update! Get the scoop on security, stability, and build numbers. Don't miss out, read now to know how you can elevate your Pixel experience.
ernest hamilton