More interesting info.

https://threatpost.com/nsas-doublepulsar-kernel-exploit-in-use-internet-wide/125165/

On Jun 23, 2017 6:51 PM, "Richard Stovall" <rich...@gmail.com> wrote:

> What I want to know is how to find a machine already infected with double
> pulsar.
>
> On Jun 23, 2017 4:49 PM, "Kurt Buff" <kurt.b...@gmail.com> wrote:
>
>> I know that EternalBlue was fixed in the March round of patches, and
>> my quick googling indidates that DoublePulsar was covered in MS17-010
>>
>> Kurt
>>
>> On Fri, Jun 23, 2017 at 12:43 PM, Ed Ziots <eziot...@gmail.com> wrote:
>> > U need to patch.. I believe the 0 days are fixed in last round of m$
>> patches
>> >
>> > On Jun 23, 2017 7:19 AM, "Kent, Larry J CTR USARMY 93 SIG BDE (US)"
>> > <larry.j.kent2....@mail.mil> wrote:
>> >>
>> >> CLASSIFICATION: UNCLASSIFIED
>> >>
>> >> Interesting article, but is there a fix for this?
>> >>
>> >> -----Original Message-----
>> >> From: listsad...@lists.myitforum.com
>> >> [mailto:listsad...@lists.myitforum.com] On Behalf Of Kurt Buff
>> >> Sent: Thursday, June 22, 2017 11:02 PM
>> >> To: ntsysadm <NTSysADM@lists.myitforum.com>
>> >> Subject: [Non-DoD Source] [NTSysADM] Thank you, NSA...
>> >>
>> >> All active links contained in this email were disabled.  Please verify
>> the
>> >> identity of the sender, and confirm the authenticity of all links
>> contained
>> >> within the message prior to copying and pasting the address to a Web
>> >> browser.
>> >>
>> >>
>> >>
>> >>
>> >> ----
>> >>
>> >>
>> >> Caution-https://www.nytimes.com/2017/06/22/technology/ransom
>> ware-attack-nsa-cyberweapons.html
>> >>
>> >> A Cyberattack ‘the World Isn’t Ready For’
>> >>
>> >> NEWARK — There have been times over the last two months when Golan
>> Ben-Oni
>> >> has felt like a voice in the wilderness.
>> >>
>> >> On April 29, someone hit his employer, IDT Corporation, with two
>> >> cyberweapons that had been stolen from the National Security Agency.
>> >> Mr. Ben-Oni, the global chief information officer at IDT, was able to
>> fend
>> >> them off, but the attack left him distraught.
>> >>
>> >> In 22 years of dealing with hackers of every sort, he had never seen
>> >> anything like it. Who was behind it? How did they evade all of his
>> defenses?
>> >> How many others had been attacked but did not know it?
>> >>
>> >> Since then, Mr. Ben-Oni has been sounding alarm bells, calling anyone
>> who
>> >> will listen at the White House, the Federal Bureau of Investigation,
>> the New
>> >> Jersey attorney general’s office and the top cybersecurity companies
>> in the
>> >> country to warn them about an attack that may still be invisibly
>> striking
>> >> victims undetected around the world.
>> >>
>> >> And he is determined to track down whoever did it.
>> >>
>> >> “I don’t pursue every attacker, just the ones that piss me off,” Mr.
>> >> Ben-Oni told me recently over lentils in his office, which was strewn
>> with
>> >> empty Red Bull cans. “This pissed me off and, more importantly, it
>> pissed my
>> >> wife off, which is the real litmus test.”
>> >>
>> >> Two weeks after IDT was hit, the cyberattack known as WannaCry ravaged
>> >> computers at hospitals in England, universities in China, rail systems
>> in
>> >> Germany, even auto plants in Japan. No doubt it was destructive.
>> >> But what Mr. Ben-Oni had witnessed was much worse, and with all eyes on
>> >> the WannaCry destruction, few seemed to be paying attention to the
>> attack on
>> >> IDT’s systems — and most likely others around the world.
>> >>
>> >> The strike on IDT, a conglomerate with headquarters in a nondescript
>> gray
>> >> building here with views of the Manhattan skyline 15 miles away, was
>> similar
>> >> to WannaCry in one way: Hackers locked up IDT data and demanded a
>> ransom to
>> >> unlock it.
>> >>
>> >> But the ransom demand was just a smoke screen for a far more invasive
>> >> attack that stole employee credentials. With those credentials in hand,
>> >> hackers could have run free through the company’s computer network,
>> taking
>> >> confidential information or destroying machines.
>> >>
>> >> Worse, the assault, which has never been reported before, was not
>> spotted
>> >> by some of the nation’s leading cybersecurity products, the top
>> security
>> >> engineers at its biggest tech companies, government intelligence
>> analysts or
>> >> the F.B.I., which remains consumed with the WannaCry attack.
>> >>
>> >> Were it not for a digital black box that recorded everything on IDT’s
>> >> network, along with Mr. Ben-Oni’s tenacity, the attack might have gone
>> >> unnoticed.
>> >>
>> >> Scans for the two hacking tools used against IDT indicate that the
>> company
>> >> is not alone. In fact, tens of thousands of computer systems all over
>> the
>> >> world have been “backdoored” by the same N.S.A. weapons.
>> >> Mr. Ben-Oni and other security researchers worry that many of those
>> other
>> >> infected computers are connected to transportation networks, hospitals,
>> >> water treatment plants and other utilities.
>> >>
>> >> An attack on those systems, they warn, could put lives at risk. And Mr.
>> >> Ben-Oni, fortified with adrenaline, Red Bull and the house beats of
>> >> Deadmau5, the Canadian record producer, said he would not stop until
>> the
>> >> attacks had been shut down and those responsible were behind bars.
>> >>
>> >> “The world is burning about WannaCry, but this is a nuclear bomb
>> compared
>> >> to WannaCry,” Mr. Ben-Oni said. “This is different. It’s a lot worse.
>> It
>> >> steals credentials. You can’t catch it, and it’s happening right under
>> our
>> >> noses.”
>> >>
>> >> And, he added, “The world isn’t ready for this.”
>> >>
>> >> Targeting the Nerve Center
>> >>
>> >> Mr. Ben-Oni, 43, a Hasidic Jew, is a slight man with smiling eyes, a
>> thick
>> >> beard and a hacker’s penchant for mischief. He grew up in the hills of
>> >> Berkeley, Calif., the son of Israeli immigrants.
>> >>
>> >> Even as a toddler, Mr. Ben-Oni’s mother said, he was not interested in
>> >> toys. She had to take him to the local junkyard to scour for
>> typewriters
>> >> that he would eventually dismantle on the living room floor. As a
>> teenager,
>> >> he aspired to become a rabbi but spent most of his free time hacking
>> >> computers at the University of California, Berkeley, where his
>> exploits once
>> >> accidentally took down Belgium’s entire phone system for 15 minutes.
>> >>
>> >> To his parents’ horror, he dropped out of college to pursue his love of
>> >> hacking full time, starting a security company to help the city of
>> Berkeley
>> >> and two nearby communities, Alameda and Novato, set up secure computer
>> >> networks.
>> >>
>> >> He had a knack for the technical work, but not the marketing, and
>> found it
>> >> difficult to get new clients. So at age 19, he crossed the country and
>> took
>> >> a job at IDT, back when the company was a low-profile long-distance
>> service
>> >> provider.
>> >>
>> >> As IDT started acquiring and spinning off an eclectic list of ventures,
>> >> Mr. Ben-Oni found himself responsible for securing shale oil projects
>> in
>> >> Mongolia and the Golan Heights, a “Star Trek” comic books company, a
>> project
>> >> to cure cancer, a yeshiva university that trains underprivileged
>> students in
>> >> cybersecurity, and a small mobile company that Verizon recently
>> acquired for
>> >> $3.1 billion.
>> >>
>> >> Which is to say he has encountered hundreds of thousands of hackers of
>> >> every stripe, motivation and skill level. He eventually started a
>> security
>> >> business, IOSecurity, under IDT, to share some of the technical tools
>> he had
>> >> developed to keep IDT’s many businesses secure.
>> >> By Mr. Ben-Oni’s estimate, IDT experiences hundreds of attacks a day on
>> >> its businesses, but perhaps only four each year that give him pause.
>> >>
>> >> Nothing compared to the attack that struck in April. Like the WannaCry
>> >> attack in May, the assault on IDT relied on cyberweapons developed by
>> the
>> >> N.S.A. that were leaked online in April by a mysterious group of
>> hackers
>> >> calling themselves the Shadow Brokers — alternately believed to be
>> >> Russia-backed cybercriminals, an N.S.A. mole, or both.
>> >>
>> >> The WannaCry attack — which the N.S.A. and security researchers have
>> tied
>> >> to North Korea — employed one N.S.A. cyberweapon; the IDT assault used
>> two.
>> >>
>> >> Both WannaCry and the IDT attack used a hacking tool the agency had
>> >> code-named EternalBlue. The tool took advantage of unpatched Microsoft
>> >> servers to automatically spread malware from one server to another, so
>> that
>> >> within 24 hours North Korea’s hackers had spread their ransomware to
>> more
>> >> than 200,000 servers around the globe.
>> >>
>> >> The attack on IDT went a step further with another stolen N.S.A.
>> >> cyberweapon, called DoublePulsar. The N.S.A. used DoublePulsar to
>> >> penetrate computer systems without tripping security alarms. It allowed
>> >> N.S.A. spies to inject their tools into the nerve center of a target’s
>> >> computer system, called the kernel, which manages communications
>> between a
>> >> computer’s hardware and its software.
>> >>
>> >> In the pecking order of a computer system, the kernel is at the very
>> top,
>> >> allowing anyone with secret access to it to take full control of a
>> machine.
>> >> It is also a dangerous blind spot for most security software, allowing
>> >> attackers to do what they want and go unnoticed. In IDT’s case,
>> attackers
>> >> used DoublePulsar to steal an IDT contractor’s credentials. Then they
>> >> deployed ransomware in what appears to be a cover for their real
>> motive:
>> >> broader access to IDT’s businesses.
>> >>
>> >> The N.S.A. campus in Fort Meade, Md. Tens of thousands of computer
>> >> systems, some of which could be connected to public utilities, have
>> been
>> >> “backdoored” using the agency’s stolen cyberweapons. Patrick
>> >> Semansky/Associated Press
>> >>
>> >> Mr. Ben-Oni learned of the attack only when a contractor, working from
>> >> home, switched on her computer to find that all her data had been
>> encrypted
>> >> and that attackers were demanding a ransom to unlock it. He might have
>> >> assumed that this was a simple case of ransomware.
>> >>
>> >> But the attack struck Mr. Ben-Oni as unique. For one thing, it was
>> timed
>> >> perfectly to the Sabbath. Attackers entered IDT’s network at 6 p.m. on
>> >> Saturday on the dot, two and a half hours before the Sabbath would end
>> and
>> >> when most of IDT’s employees — 40 percent of whom identify as Orthodox
>> Jews
>> >> — would be off the clock. For another, the attackers compromised the
>> >> contractor’s computer through her home modem — strange.
>> >>
>> >> The black box of sorts, a network recording device made by the Israeli
>> >> security company Secdo, shows that the ransomware was installed after
>> the
>> >> attackers had made off with the contractor’s credentials. And they
>> managed
>> >> to bypass every major security detection mechanism along the way.
>> Finally,
>> >> before they left, they encrypted her computer with ransomware,
>> demanding
>> >> $130 to unlock it, to cover up the more invasive attack on her
>> computer.
>> >>
>> >> Mr. Ben-Oni estimates that he has spoken to 107 security experts and
>> >> researchers about the attack, including the chief executives of nearly
>> every
>> >> major security company and the heads of threat intelligence at Google,
>> >> Microsoft and Amazon.
>> >>
>> >> With the exception of Amazon, which found that some of its customers’
>> >> computers had been scanned by the same computer that hit IDT, no one
>> had
>> >> seen any trace of the attack before Mr. Ben-Oni notified them. The New
>> York
>> >> Times confirmed Mr. Ben-Oni’s account via written summaries provided
>> by Palo
>> >> Alto Networks, Intel’s McAfee and other security firms he used and
>> asked to
>> >> investigate the attack.
>> >>
>> >> “I started to get the sense that we were the canary,” he said. “But we
>> >> recorded it.”
>> >>
>> >> Since IDT was hit, Mr. Ben-Oni has contacted everyone in his Rolodex to
>> >> warn them of an attack that could still be worming its way, undetected,
>> >> through victims’ systems.
>> >>
>> >> “Time is burning,” Mr. Ben-Oni said. “Understand, this is really a war
>> —
>> >> with offense on one side, and institutions, organizations and schools
>> on the
>> >> other, defending against an unknown adversary.”
>> >>
>> >> ‘No One Is Running Point’
>> >>
>> >> Since the Shadow Brokers leaked dozens of coveted attack tools in
>> April,
>> >> hospitals, schools, cities, police departments and companies around the
>> >> world have largely been left to fend for themselves against weapons
>> >> developed by the world’s most sophisticated attacker: the N.S.A.
>> >>
>> >> A month earlier, Microsoft had issued a software patch to defend
>> against
>> >> the N.S.A. hacking tools — suggesting that the agency tipped the
>> company off
>> >> to what was coming. Microsoft regularly credits those who point out
>> >> vulnerabilities in its products, but in this case the company made no
>> >> mention of the tipster. Later, when the WannaCry attack hit hundreds of
>> >> thousands of Microsoft customers, Microsoft’s president, Brad Smith,
>> slammed
>> >> the government in a blog post for hoarding and stockpiling security
>> >> vulnerabilities.
>> >>
>> >> For his part, Mr. Ben-Oni said he had rolled out Microsoft’s patches as
>> >> soon as they became available, but attackers still managed to get in
>> through
>> >> the IDT contractor’s home modem.
>> >>
>> >> Six years ago, Mr. Ben-Oni had a chance meeting with an N.S.A.
>> >> employee at a conference and asked him how to defend against modern-day
>> >> cyberthreats. The N.S.A. employee advised him to “run three of
>> everything”:
>> >> three firewalls, three antivirus solutions, three intrusion detection
>> >> systems. And so he did.
>> >>
>> >> But in this case, modern-day detection systems created by Cylance,
>> McAfee
>> >> and Microsoft and patching systems by Tanium did not catch the attack
>> on
>> >> IDT. Nor did any of the 128 publicly available threat intelligence
>> feeds
>> >> that IDT subscribes to. Even the 10 threat intelligence feeds that his
>> >> organization spends a half-million dollars on annually for urgent
>> >> information failed to report it. He has since threatened to return
>> their
>> >> products.
>> >>
>> >> “Our industry likes to work on known problems,” Mr. Ben-Oni said.
>> >> “This is an unknown problem. We’re not ready for this.”
>> >>
>> >> No one he has spoken to knows whether they have been hit, but just this
>> >> month, restaurants across the United States reported being hit with
>> similar
>> >> attacks that were undetected by antivirus systems. There are now
>> YouTube
>> >> videos showing criminals how to attack systems using the very same
>> N.S.A.
>> >> tools used against IDT, and Metasploit, an automated hacking tool, now
>> >> allows anyone to carry out these attacks with the click of a button.
>> >>
>> >> Worse still, Mr. Ben-Oni said, “No one is running point on this.”
>> >>
>> >> Last month, he personally briefed the F.B.I. analyst in charge of
>> >> investigating the WannaCry attack. He was told that the agency had been
>> >> specifically tasked with WannaCry, and that even though the attack on
>> his
>> >> company was more invasive and sophisticated, it was still technically
>> >> something else, and therefore the F.B.I. could not take on his case.
>> >>
>> >> The F.B.I. did not respond to requests for comment.
>> >>
>> >> So Mr. Ben-Oni has largely pursued the case himself. His team at IDT
>> was
>> >> able to trace part of the attack to a personal Android phone in Russia
>> and
>> >> has been feeding its findings to Europol, the European law enforcement
>> >> agency based in The Hague.
>> >>
>> >> The chances that IDT was the only victim of this attack are slim. Sean
>> >> Dillon, a senior analyst at RiskSense, a New Mexico security company,
>> was
>> >> among the first security researchers to scan the internet for the
>> N.S.A.’s
>> >> DoublePulsar tool. He found tens of thousands of host computers are
>> infected
>> >> with the tool, which attackers can use at will.
>> >>
>> >> “Once DoublePulsar is on the machine, there’s nothing stopping anyone
>> else
>> >> from coming along and using the back door,” Mr. Dillon said.
>> >>
>> >> More distressing, Mr. Dillon tested all the major antivirus products
>> >> against the DoublePulsar infection and a demoralizing 99 percent
>> failed to
>> >> detect it.
>> >>
>> >> “We’ve seen the same computers infected with DoublePulsar for two
>> months
>> >> and there is no telling how much malware is on those systems,”
>> >> Mr. Dillon said. “Right now we have no idea what’s gotten into these
>> >> organizations.”
>> >>
>> >> In the worst case, Mr. Dillon said, attackers could use those back
>> doors
>> >> to unleash destructive malware into critical infrastructure, tying up
>> rail
>> >> systems, shutting down hospitals or even paralyzing electrical
>> utilities.
>> >>
>> >> Could that attack be coming? The Shadow Brokers resurfaced last month,
>> >> promising a fresh load of N.S.A. attack tools, even offering to supply
>> them
>> >> for monthly paying subscribers — like a wine-of-the-month club for
>> >> cyberweapon enthusiasts.
>> >>
>> >> In a hint that the industry is taking the group’s threats seriously,
>> >> Microsoft issued a new set of patches to defend against such attacks.
>> >> The company noted in an ominously worded message that the patches were
>> >> critical, citing an “elevated risk for destructive cyberattacks.”
>> >>
>> >> Mr. Ben-Oni is convinced that IDT is not the only victim, and that
>> these
>> >> tools can and will be used to do far worse.
>> >>
>> >> “I look at this as a life-or-death situation,” he said. “Today it’s us,
>> >> but tomorrow it might be someone else.”
>> >>
>> >>
>> >> CLASSIFICATION: UNCLASSIFIED
>>
>>
>>

Reply via email to