{"id":7416,"date":"2017-04-22T04:30:52","date_gmt":"2017-04-22T12:30:52","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/22\/news-1207\/"},"modified":"2017-04-22T04:30:52","modified_gmt":"2017-04-22T12:30:52","slug":"news-1207","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/22\/news-1207\/","title":{"rendered":"There&#039;s now a tool to test for NSA spyware"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2016\/11\/hacking-1685092-100696508-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Sat, 22 Apr 2017 04:43:00 -0700<\/strong><\/p>\n<p>Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.<\/p>\n<p>Luke Jennings of security firm Countercept wrote a script in response to last week\u2019s high-profile leak of cyberweapons that some researchers believe are from the National Security Agency. It&#8217;s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.<\/p>\n<p>The script, which requires some programming skill to use, is available for download on <a href=\"https:\/\/github.com\/countercept\/doublepulsar-c2-traffic-decryptor\">GitHub<\/a>.<\/p>\n<p>Some security researchers have used Jennings&#8217;s script to scan the internet for machines infected with the implant. Their results have varied widely, showing between 30,000 and <a href=\"http:\/\/blog.binaryedge.io\/2017\/04\/21\/doublepulsar\/\">100,000<\/a> computers with the code on them. \u00a0<\/p>\n<p>Below0Day, a penetration testing company, has <a href=\"https:\/\/twitter.com\/belowzeroday\/status\/855441754929188864\">tweeted<\/a> graphs showing which countries are most affected. The U.S. sits at the top, with 11,000 machines.<\/p>\n<p>Several other countries, including U.K., Taiwan and Germany, have more than 1,500 machines infected.<\/p>\n<p>It\u2019s not clear when these machines were infected with the implant, Jennings said. However, the suspected NSA exploits that deliver Doublepulsar were leaked a week ago, at which point anyone with some hacking skills could start using them.<\/p>\n<p>Security experts are worried that cybercriminals or foreign governments might take the leaked exploits and attack vulnerable machines over the internet. They say computers with older or unpatched Windows systems are particularly at risk. Rebooting a system will remove the implant, but not necessarily any malware associated with it.<\/p>\n<p>Jennings said he developed his script by <a href=\"https:\/\/countercept.com\/our-thinking\/analyzing-the-doublepulsar-kernel-dll-injection-technique\/\">analyzing<\/a> how the Doublepulsar implant communicated over the internet to its control server. However, his original intention was to help businesses identify the implant over their networks, not to scan the entire internet for the implant.<\/p>\n<p>\u201cThere\u2019s been a lot of discussion on Twitter,\u201d he said. \u201cPeople are wondering if maybe the script is incorrect, because they are surprised by the number of systems infected.\u201d<\/p>\n<p>However, not one has presented evidence that his computer script is wrong, Jennings said. \u00a0<\/p>\n<p>&#8220;There\u2019s probably a group out there, or many out there, using these exploits to compromise vulnerable machines,\u201d he said.<\/p>\n<p>Older Windows Server systems, especially those running without a firewall, are considered easy to hack with the exploits. Thousands of these machines around the internet appear to be <a href=\"https:\/\/www.renditioninfosec.com\/2017\/04\/shadow_brokers_windows_exploits\/\">exposed<\/a>.<\/p>\n<p>Dan Tentler, CEO of security provider Phobos Group, has been looking at the accuracy of the script. He\u2019s already done manual checks on 50 machines that were flagged as infected, and all 50 of them were.<\/p>\n<p>\u201cUsually if you check that many, and the scripting is bad, you would expect to find a handful that were false positives,\u201d he said. \u201cBut I\u2019ve found zero false positives.\u201d<\/p>\n<p>It\u2019ll take more time for security researchers to vet the accuracy of the Doublepulsar search results. But Tentler recommends system operators take steps to prevent infection from the recently leaked malware.\u00a0<\/p>\n<p>Users should install all available patches on their Windows system, he says. <a href=\"http:\/\/computerworld.com\/article\/3190274\/microsoft-windows\/microsoft-confirms-its-patched-most-of-the-nsas-windows-exploits.html\">Past patches<\/a> from Microsoft will address the danger, but older operating systems like Windows XP and Windows Server 2003 no longer receive support from the company. \u00a0<\/p>\n<p>Users can consider upgrading the system to a newer OS. They\u00a0can also run antivirus products like Windows Defender to help them root out any malware.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3191729\/security\/theres-now-a-tool-to-test-for-nsa-spyware.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2016\/11\/hacking-1685092-100696508-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Sat, 22 Apr 2017 04:43:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.<\/p>\n<p>Luke Jennings of security firm Countercept wrote a script in response to last week\u2019s high-profile leak of cyberweapons that some researchers believe are from the National Security Agency. It&#8217;s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.<\/p>\n<p>The script, which requires some programming skill to use, is available for download on <a href=\"https:\/\/github.com\/countercept\/doublepulsar-c2-traffic-decryptor\">GitHub<\/a>.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3191729\/security\/theres-now-a-tool-to-test-for-nsa-spyware.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11073,714],"class_list":["post-7416","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-malware-vulnerabilities","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7416"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7416\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}