Leaked NSA Spying Tools Puts Windows Server At Risk
Caezar SottoA mysterious hacking group has recently leaked what seems to be the NSA's suspected spying tools. The cyber weapons (which are now available to the public) shows how vulnerable older Windows Servers really are.
On Friday, the Shadow Brokers leaked the files online. Setting off a ripple effect for concerned tech experts that are now worried about the discovery. According to PCWorld, concerns for cyber criminals incorporating the tools in their hacks is becoming apparent.
Matthew Hickey, the director of online security provider Hacker House believes that the "leak puts state tools into the hands of anyone."
His dissection of the NSA tools revealed 20 different Windows exploits, including four which appear to support previously unknown software vulnerabilities.
A post by ZDNet states that each exploit works as a program that takes advantage of a security flaw. Furthermore, researchers are still examining the leaked files.
Windows systems that are affected by the alleged NSA tools include older versions of the OS, including NT, XP and the Windows 7. Moreover, computers running Windows Server are in a bigger risk.
The exploits are designed to leverage vulnerabilities in a workstation's online server functions. Hickey added that one exploit called the "Eternalblue" could remotely cause older versions of Windows to execute code.
He demonstrated this against a computer running Windows Server 2008 R2 SP1. Surprisingly, he pulled off the hack in less than two minutes. He continued that an "attacker can use these tools to hack into Windows computers and run their code for future attacks."
For instance, a hacker could open a backdoor channel into the machine to upload ransomware or steal sensitive data. The bigger dilemma lies in the latest version of Windows Server that rolled out last year.
On Friday Microsoft stated that it was still studying the exploits. Amol Sarwate, director of engineering for Qualys, said that computers behind a firewall should be safe. He said the vulnerable systems "should consider disabling certain functions that the exploits use."
most read
related stories
more stories from News
Discover the key features and security enhancements of Apple's iOS 17.5 update.
ernest hamiltonDiscover top iPhone apps that let you earn real money by playing games, scanning receipts, and staying active.
ernest hamiltonSamsung has reached a remarkable milestone, shipping nearly 3 billion smartphones since 2014. Discover how the tech giant's decade-long dominance and innovative advancements have solidified its leadership in the global smartphone market.
ernest hamiltonLearn about Apple's settlement in the class-action lawsuit over iPhone 7 audio issues, offering up to $349 compensation for eligible users. Dive into the details and implications of this landmark agreement.
ernest hamiltonThousands of Apple users experienced a major iMessage outage on Thursday evening, impacting communication across the U.S., Canada, and the U.K. Downdetector reported over 13,000 disruptions starting at 6 p.m. ET. Stay updated with the latest developments and potential fixes.
ernest hamiltonDelve into the complexities of managing screen time for children as parents navigate between practicality and idealism.
ernest hamiltonDiscover why the Pixel 7a outperforms the new Pixel 8a in this detailed comparison. Learn about the advantages in affordability, color options, and feature parity. Read now to make an informed choice!
ernest hamiltonDiscover the future of smartphone audio with Moondrop's MIAD 01. Explore its dual audio jacks and premium DACs in this in-depth review. Ready to elevate your music experience? Read now!
ernest hamilton