Menu
Leaked NSA exploits plant a bull's-eye on Windows Server

Leaked NSA exploits plant a bull's-eye on Windows Server

A hacking group leaked spying tools on Friday that can target older versions of Windows

Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS.

The Shadow Brokers, a mysterious hacking group, leaked the files online, setting off worries that cybercriminals will incorporate them in their own hacks.

“This leak basically puts nation-state tools into the hands of anyone who wants them,” said Matthew Hickey, the director of security provider Hacker House.

He’s been among the researchers looking over the files and has found they contain about 20 different Windows-based exploits -- four of which appear to leverage previously unknown software vulnerabilities.

Each exploit works as a program that takes advantage of a security flaw. Researchers are still examining the leaked files, but the exploits appear to work on older Windows versions including NT, XP and Windows 7.

However, computers running Windows Server are particularly at risk, Hickey said. That’s because the exploits are generally designed to leverage vulnerabilities in a machine’s online server functions.

Hickey found that one such exploit included in the leak, called Eternalblue, can remotely cause older versions of Windows to execute code. In a video , he demonstrated this against a machine running Windows Server 2008 R2 SP1 and pulled off the hack in less than two minutes.

“An attacker can use these tools to effectively hack into Windows computers around the world and run their own code for attacks,” he said.

For example, a hacker could open a backdoor into the machine to upload other malicious that can act as ransomware or steal sensitive data.

What makes the exploits a particularly big problem is that older versions of Windows Server remain widely used. The latest version, Windows Server 2016, was launched only last year.

“These are very serious vulnerabilities, with a very serious impact on Microsoft,” Hickey said.

Microsoft has yet to release a patch, and it’s unclear when that might happen. On Friday, the software giant said it was still studying the leaked exploits.

Computers that are behind a firewall should be safe. For those that aren't, companies should consider disabling certain functions that the exploits use, said Amol Sarwate, director of engineering for security firm Qualys.

For example, the Eternalblue exploit leverages the Server Message Block and NetBT protocols to hijack the system.

He also recommends that companies take inventory of their IT assets so they know which servers might be vulnerable.

“Customers should proactively keep an eye out for this, and of course have a strategy to patch them” when a patch becomes available, Sarwate said. “Asset management is very crucial here.”


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

Malwarebytes shoots the breeze with channel, prospects

Malwarebytes shoots the breeze with channel, prospects

A Kumeu, Auckland, winery was the venue for a Malwarebytes event for partner and prospect MSPs - with some straight shooting on the side. The half-day getaway, which featured an archery competition, lunch and wine-tasting aimed at bringing Malwarebytes' local New Zealand and top and prospective MSP partners together to celebrate recent local successes, and discuss the current state of malware in New Zealand. This was also a unique opportunity for local MSPs to learn about how they can get the most out of Malwarebytes' MSP program and offering, as more Kiwi businesses are targeted by malware.

Malwarebytes shoots the breeze with channel, prospects
EDGE 2019: Channel forges new partnerships during evening networking

EDGE 2019: Channel forges new partnerships during evening networking

Partners, vendors and distributors reconnected during a number of social gatherings during EDGE 2019. The first evening saw the channel congregate for a welcome party at the Hamilton Island yacht club, while the main poolside proved to be the perfect stop for a barbecue on the final night.

EDGE 2019: Channel forges new partnerships during evening networking
Show Comments