Thank you. On Jun 23, 2017 7:27 PM, "Kurt Buff" <[email protected]> wrote:
> There are some scripts/services that can scan machines for infection: > > https://github.com/countercept/doublepulsar-detection-script <<< python > script > > https://doublepulsar.below0day.com/ <<< scan public addresses from a > web site, which seems to use the above script > > Kurt > > > On Fri, Jun 23, 2017 at 3:44 PM, Richard Stovall <[email protected]> > wrote: > > What I want to know is how to find a machine already infected with double > > pulsar. > > > > On Jun 23, 2017 4:49 PM, "Kurt Buff" <[email protected]> wrote: > >> > >> I know that EternalBlue was fixed in the March round of patches, and > >> my quick googling indidates that DoublePulsar was covered in MS17-010 > >> > >> Kurt > >> > >> On Fri, Jun 23, 2017 at 12:43 PM, Ed Ziots <[email protected]> wrote: > >> > U need to patch.. I believe the 0 days are fixed in last round of m$ > >> > patches > >> > > >> > On Jun 23, 2017 7:19 AM, "Kent, Larry J CTR USARMY 93 SIG BDE (US)" > >> > <[email protected]> wrote: > >> >> > >> >> CLASSIFICATION: UNCLASSIFIED > >> >> > >> >> Interesting article, but is there a fix for this? > >> >> > >> >> -----Original Message----- > >> >> From: [email protected] > >> >> [mailto:[email protected]] On Behalf Of Kurt Buff > >> >> Sent: Thursday, June 22, 2017 11:02 PM > >> >> To: ntsysadm <[email protected]> > >> >> Subject: [Non-DoD Source] [NTSysADM] Thank you, NSA... > >> >> > >> >> All active links contained in this email were disabled. Please > verify > >> >> the > >> >> identity of the sender, and confirm the authenticity of all links > >> >> contained > >> >> within the message prior to copying and pasting the address to a Web > >> >> browser. > >> >> > >> >> > >> >> > >> >> > >> >> ---- > >> >> > >> >> > >> >> > >> >> Caution-https://www.nytimes.com/2017/06/22/technology/ > ransomware-attack-nsa-cyberweapons.html > >> >> > >> >> A Cyberattack ‘the World Isn’t Ready For’ > >> >> > >> >> NEWARK — There have been times over the last two months when Golan > >> >> Ben-Oni > >> >> has felt like a voice in the wilderness. > >> >> > >> >> On April 29, someone hit his employer, IDT Corporation, with two > >> >> cyberweapons that had been stolen from the National Security Agency. > >> >> Mr. Ben-Oni, the global chief information officer at IDT, was able to > >> >> fend > >> >> them off, but the attack left him distraught. > >> >> > >> >> In 22 years of dealing with hackers of every sort, he had never seen > >> >> anything like it. Who was behind it? How did they evade all of his > >> >> defenses? > >> >> How many others had been attacked but did not know it? > >> >> > >> >> Since then, Mr. Ben-Oni has been sounding alarm bells, calling anyone > >> >> who > >> >> will listen at the White House, the Federal Bureau of Investigation, > >> >> the New > >> >> Jersey attorney general’s office and the top cybersecurity companies > in > >> >> the > >> >> country to warn them about an attack that may still be invisibly > >> >> striking > >> >> victims undetected around the world. > >> >> > >> >> And he is determined to track down whoever did it. > >> >> > >> >> “I don’t pursue every attacker, just the ones that piss me off,” Mr. > >> >> Ben-Oni told me recently over lentils in his office, which was strewn > >> >> with > >> >> empty Red Bull cans. “This pissed me off and, more importantly, it > >> >> pissed my > >> >> wife off, which is the real litmus test.” > >> >> > >> >> Two weeks after IDT was hit, the cyberattack known as WannaCry > ravaged > >> >> computers at hospitals in England, universities in China, rail > systems > >> >> in > >> >> Germany, even auto plants in Japan. No doubt it was destructive. > >> >> But what Mr. Ben-Oni had witnessed was much worse, and with all eyes > on > >> >> the WannaCry destruction, few seemed to be paying attention to the > >> >> attack on > >> >> IDT’s systems — and most likely others around the world. > >> >> > >> >> The strike on IDT, a conglomerate with headquarters in a nondescript > >> >> gray > >> >> building here with views of the Manhattan skyline 15 miles away, was > >> >> similar > >> >> to WannaCry in one way: Hackers locked up IDT data and demanded a > >> >> ransom to > >> >> unlock it. > >> >> > >> >> But the ransom demand was just a smoke screen for a far more invasive > >> >> attack that stole employee credentials. With those credentials in > hand, > >> >> hackers could have run free through the company’s computer network, > >> >> taking > >> >> confidential information or destroying machines. > >> >> > >> >> Worse, the assault, which has never been reported before, was not > >> >> spotted > >> >> by some of the nation’s leading cybersecurity products, the top > >> >> security > >> >> engineers at its biggest tech companies, government intelligence > >> >> analysts or > >> >> the F.B.I., which remains consumed with the WannaCry attack. > >> >> > >> >> Were it not for a digital black box that recorded everything on IDT’s > >> >> network, along with Mr. Ben-Oni’s tenacity, the attack might have > gone > >> >> unnoticed. > >> >> > >> >> Scans for the two hacking tools used against IDT indicate that the > >> >> company > >> >> is not alone. In fact, tens of thousands of computer systems all over > >> >> the > >> >> world have been “backdoored” by the same N.S.A. weapons. > >> >> Mr. Ben-Oni and other security researchers worry that many of those > >> >> other > >> >> infected computers are connected to transportation networks, > hospitals, > >> >> water treatment plants and other utilities. > >> >> > >> >> An attack on those systems, they warn, could put lives at risk. And > Mr. > >> >> Ben-Oni, fortified with adrenaline, Red Bull and the house beats of > >> >> Deadmau5, the Canadian record producer, said he would not stop until > >> >> the > >> >> attacks had been shut down and those responsible were behind bars. > >> >> > >> >> “The world is burning about WannaCry, but this is a nuclear bomb > >> >> compared > >> >> to WannaCry,” Mr. Ben-Oni said. “This is different. It’s a lot worse. > >> >> It > >> >> steals credentials. You can’t catch it, and it’s happening right > under > >> >> our > >> >> noses.” > >> >> > >> >> And, he added, “The world isn’t ready for this.” > >> >> > >> >> Targeting the Nerve Center > >> >> > >> >> Mr. Ben-Oni, 43, a Hasidic Jew, is a slight man with smiling eyes, a > >> >> thick > >> >> beard and a hacker’s penchant for mischief. He grew up in the hills > of > >> >> Berkeley, Calif., the son of Israeli immigrants. > >> >> > >> >> Even as a toddler, Mr. Ben-Oni’s mother said, he was not interested > in > >> >> toys. She had to take him to the local junkyard to scour for > >> >> typewriters > >> >> that he would eventually dismantle on the living room floor. As a > >> >> teenager, > >> >> he aspired to become a rabbi but spent most of his free time hacking > >> >> computers at the University of California, Berkeley, where his > exploits > >> >> once > >> >> accidentally took down Belgium’s entire phone system for 15 minutes. > >> >> > >> >> To his parents’ horror, he dropped out of college to pursue his love > of > >> >> hacking full time, starting a security company to help the city of > >> >> Berkeley > >> >> and two nearby communities, Alameda and Novato, set up secure > computer > >> >> networks. > >> >> > >> >> He had a knack for the technical work, but not the marketing, and > found > >> >> it > >> >> difficult to get new clients. So at age 19, he crossed the country > and > >> >> took > >> >> a job at IDT, back when the company was a low-profile long-distance > >> >> service > >> >> provider. > >> >> > >> >> As IDT started acquiring and spinning off an eclectic list of > ventures, > >> >> Mr. Ben-Oni found himself responsible for securing shale oil projects > >> >> in > >> >> Mongolia and the Golan Heights, a “Star Trek” comic books company, a > >> >> project > >> >> to cure cancer, a yeshiva university that trains underprivileged > >> >> students in > >> >> cybersecurity, and a small mobile company that Verizon recently > >> >> acquired for > >> >> $3.1 billion. > >> >> > >> >> Which is to say he has encountered hundreds of thousands of hackers > of > >> >> every stripe, motivation and skill level. He eventually started a > >> >> security > >> >> business, IOSecurity, under IDT, to share some of the technical tools > >> >> he had > >> >> developed to keep IDT’s many businesses secure. > >> >> By Mr. Ben-Oni’s estimate, IDT experiences hundreds of attacks a day > on > >> >> its businesses, but perhaps only four each year that give him pause. > >> >> > >> >> Nothing compared to the attack that struck in April. Like the > WannaCry > >> >> attack in May, the assault on IDT relied on cyberweapons developed by > >> >> the > >> >> N.S.A. that were leaked online in April by a mysterious group of > >> >> hackers > >> >> calling themselves the Shadow Brokers — alternately believed to be > >> >> Russia-backed cybercriminals, an N.S.A. mole, or both. > >> >> > >> >> The WannaCry attack — which the N.S.A. and security researchers have > >> >> tied > >> >> to North Korea — employed one N.S.A. cyberweapon; the IDT assault > used > >> >> two. > >> >> > >> >> Both WannaCry and the IDT attack used a hacking tool the agency had > >> >> code-named EternalBlue. The tool took advantage of unpatched > Microsoft > >> >> servers to automatically spread malware from one server to another, > so > >> >> that > >> >> within 24 hours North Korea’s hackers had spread their ransomware to > >> >> more > >> >> than 200,000 servers around the globe. > >> >> > >> >> The attack on IDT went a step further with another stolen N.S.A. > >> >> cyberweapon, called DoublePulsar. The N.S.A. used DoublePulsar to > >> >> penetrate computer systems without tripping security alarms. It > allowed > >> >> N.S.A. spies to inject their tools into the nerve center of a > target’s > >> >> computer system, called the kernel, which manages communications > >> >> between a > >> >> computer’s hardware and its software. > >> >> > >> >> In the pecking order of a computer system, the kernel is at the very > >> >> top, > >> >> allowing anyone with secret access to it to take full control of a > >> >> machine. > >> >> It is also a dangerous blind spot for most security software, > allowing > >> >> attackers to do what they want and go unnoticed. In IDT’s case, > >> >> attackers > >> >> used DoublePulsar to steal an IDT contractor’s credentials. Then they > >> >> deployed ransomware in what appears to be a cover for their real > >> >> motive: > >> >> broader access to IDT’s businesses. > >> >> > >> >> The N.S.A. campus in Fort Meade, Md. Tens of thousands of computer > >> >> systems, some of which could be connected to public utilities, have > >> >> been > >> >> “backdoored” using the agency’s stolen cyberweapons. Patrick > >> >> Semansky/Associated Press > >> >> > >> >> Mr. Ben-Oni learned of the attack only when a contractor, working > from > >> >> home, switched on her computer to find that all her data had been > >> >> encrypted > >> >> and that attackers were demanding a ransom to unlock it. He might > have > >> >> assumed that this was a simple case of ransomware. > >> >> > >> >> But the attack struck Mr. Ben-Oni as unique. For one thing, it was > >> >> timed > >> >> perfectly to the Sabbath. Attackers entered IDT’s network at 6 p.m. > on > >> >> Saturday on the dot, two and a half hours before the Sabbath would > end > >> >> and > >> >> when most of IDT’s employees — 40 percent of whom identify as > Orthodox > >> >> Jews > >> >> — would be off the clock. For another, the attackers compromised the > >> >> contractor’s computer through her home modem — strange. > >> >> > >> >> The black box of sorts, a network recording device made by the > Israeli > >> >> security company Secdo, shows that the ransomware was installed after > >> >> the > >> >> attackers had made off with the contractor’s credentials. And they > >> >> managed > >> >> to bypass every major security detection mechanism along the way. > >> >> Finally, > >> >> before they left, they encrypted her computer with ransomware, > >> >> demanding > >> >> $130 to unlock it, to cover up the more invasive attack on her > >> >> computer. > >> >> > >> >> Mr. Ben-Oni estimates that he has spoken to 107 security experts and > >> >> researchers about the attack, including the chief executives of > nearly > >> >> every > >> >> major security company and the heads of threat intelligence at > Google, > >> >> Microsoft and Amazon. > >> >> > >> >> With the exception of Amazon, which found that some of its customers’ > >> >> computers had been scanned by the same computer that hit IDT, no one > >> >> had > >> >> seen any trace of the attack before Mr. Ben-Oni notified them. The > New > >> >> York > >> >> Times confirmed Mr. Ben-Oni’s account via written summaries provided > by > >> >> Palo > >> >> Alto Networks, Intel’s McAfee and other security firms he used and > >> >> asked to > >> >> investigate the attack. > >> >> > >> >> “I started to get the sense that we were the canary,” he said. “But > we > >> >> recorded it.” > >> >> > >> >> Since IDT was hit, Mr. Ben-Oni has contacted everyone in his Rolodex > to > >> >> warn them of an attack that could still be worming its way, > undetected, > >> >> through victims’ systems. > >> >> > >> >> “Time is burning,” Mr. Ben-Oni said. “Understand, this is really a > war > >> >> — > >> >> with offense on one side, and institutions, organizations and schools > >> >> on the > >> >> other, defending against an unknown adversary.” > >> >> > >> >> ‘No One Is Running Point’ > >> >> > >> >> Since the Shadow Brokers leaked dozens of coveted attack tools in > >> >> April, > >> >> hospitals, schools, cities, police departments and companies around > the > >> >> world have largely been left to fend for themselves against weapons > >> >> developed by the world’s most sophisticated attacker: the N.S.A. > >> >> > >> >> A month earlier, Microsoft had issued a software patch to defend > >> >> against > >> >> the N.S.A. hacking tools — suggesting that the agency tipped the > >> >> company off > >> >> to what was coming. Microsoft regularly credits those who point out > >> >> vulnerabilities in its products, but in this case the company made no > >> >> mention of the tipster. Later, when the WannaCry attack hit hundreds > of > >> >> thousands of Microsoft customers, Microsoft’s president, Brad Smith, > >> >> slammed > >> >> the government in a blog post for hoarding and stockpiling security > >> >> vulnerabilities. > >> >> > >> >> For his part, Mr. Ben-Oni said he had rolled out Microsoft’s patches > as > >> >> soon as they became available, but attackers still managed to get in > >> >> through > >> >> the IDT contractor’s home modem. > >> >> > >> >> Six years ago, Mr. Ben-Oni had a chance meeting with an N.S.A. > >> >> employee at a conference and asked him how to defend against > modern-day > >> >> cyberthreats. The N.S.A. employee advised him to “run three of > >> >> everything”: > >> >> three firewalls, three antivirus solutions, three intrusion detection > >> >> systems. And so he did. > >> >> > >> >> But in this case, modern-day detection systems created by Cylance, > >> >> McAfee > >> >> and Microsoft and patching systems by Tanium did not catch the attack > >> >> on > >> >> IDT. Nor did any of the 128 publicly available threat intelligence > >> >> feeds > >> >> that IDT subscribes to. Even the 10 threat intelligence feeds that > his > >> >> organization spends a half-million dollars on annually for urgent > >> >> information failed to report it. He has since threatened to return > >> >> their > >> >> products. > >> >> > >> >> “Our industry likes to work on known problems,” Mr. Ben-Oni said. > >> >> “This is an unknown problem. We’re not ready for this.” > >> >> > >> >> No one he has spoken to knows whether they have been hit, but just > this > >> >> month, restaurants across the United States reported being hit with > >> >> similar > >> >> attacks that were undetected by antivirus systems. There are now > >> >> YouTube > >> >> videos showing criminals how to attack systems using the very same > >> >> N.S.A. > >> >> tools used against IDT, and Metasploit, an automated hacking tool, > now > >> >> allows anyone to carry out these attacks with the click of a button. > >> >> > >> >> Worse still, Mr. Ben-Oni said, “No one is running point on this.” > >> >> > >> >> Last month, he personally briefed the F.B.I. analyst in charge of > >> >> investigating the WannaCry attack. He was told that the agency had > been > >> >> specifically tasked with WannaCry, and that even though the attack on > >> >> his > >> >> company was more invasive and sophisticated, it was still technically > >> >> something else, and therefore the F.B.I. could not take on his case. > >> >> > >> >> The F.B.I. did not respond to requests for comment. > >> >> > >> >> So Mr. Ben-Oni has largely pursued the case himself. His team at IDT > >> >> was > >> >> able to trace part of the attack to a personal Android phone in > Russia > >> >> and > >> >> has been feeding its findings to Europol, the European law > enforcement > >> >> agency based in The Hague. > >> >> > >> >> The chances that IDT was the only victim of this attack are slim. > Sean > >> >> Dillon, a senior analyst at RiskSense, a New Mexico security company, > >> >> was > >> >> among the first security researchers to scan the internet for the > >> >> N.S.A.’s > >> >> DoublePulsar tool. He found tens of thousands of host computers are > >> >> infected > >> >> with the tool, which attackers can use at will. > >> >> > >> >> “Once DoublePulsar is on the machine, there’s nothing stopping anyone > >> >> else > >> >> from coming along and using the back door,” Mr. Dillon said. > >> >> > >> >> More distressing, Mr. Dillon tested all the major antivirus products > >> >> against the DoublePulsar infection and a demoralizing 99 percent > failed > >> >> to > >> >> detect it. > >> >> > >> >> “We’ve seen the same computers infected with DoublePulsar for two > >> >> months > >> >> and there is no telling how much malware is on those systems,” > >> >> Mr. Dillon said. “Right now we have no idea what’s gotten into these > >> >> organizations.” > >> >> > >> >> In the worst case, Mr. Dillon said, attackers could use those back > >> >> doors > >> >> to unleash destructive malware into critical infrastructure, tying up > >> >> rail > >> >> systems, shutting down hospitals or even paralyzing electrical > >> >> utilities. > >> >> > >> >> Could that attack be coming? The Shadow Brokers resurfaced last > month, > >> >> promising a fresh load of N.S.A. attack tools, even offering to > supply > >> >> them > >> >> for monthly paying subscribers — like a wine-of-the-month club for > >> >> cyberweapon enthusiasts. > >> >> > >> >> In a hint that the industry is taking the group’s threats seriously, > >> >> Microsoft issued a new set of patches to defend against such attacks. > >> >> The company noted in an ominously worded message that the patches > were > >> >> critical, citing an “elevated risk for destructive cyberattacks.” > >> >> > >> >> Mr. Ben-Oni is convinced that IDT is not the only victim, and that > >> >> these > >> >> tools can and will be used to do far worse. > >> >> > >> >> “I look at this as a life-or-death situation,” he said. “Today it’s > us, > >> >> but tomorrow it might be someone else.” > >> >> > >> >> > >> >> CLASSIFICATION: UNCLASSIFIED > >> > >> > > > > >

