[jpshare] A Recent Mass Scan Revealed That More than 30000 Windows Machine Infected by National Security Agency Backdoor DOUBLEPULSAR .DOUBLEPULSAR one of the NSA hacking tools leaked last Friday by the Shadow Brokers .
This Mass Scan was performed in the course of recent days by Security Researchers from Binary Edge, a Security firm headquartered in Switzerland.
The NSA Tool Called DOUBLEPULSAR that is designed to provide covert, backdoor access to a Windows system, have been immediately received by Attackers .
According to researchers ,Once installed, DOUBLEPULSAR waits for certain types of data to be sent over port 445. When DOUBLEPULSAR arrives, the implant provides a distinctive response.
NSA implant is code-named ,DOUBLEPULSAR scanned still Now more than 107,000 Computers by Binary Edge .
Another scan don e by security firm Errata Security CEO Rob Graham and another by researchers from Below0day and Find Roughly 41,000 and 30,000 infected machines.
Over the past 24 hours—as additional scans have continued to detect between 30,000 and 60,000 infectionsThe exploits targeting SMB (Server Message Block) and NetBIOS protocol
SMB is a network file sharing protocol that allows applications on a computer to read and write (in)to files and request services from server programs in a computer network.
Security Researcher Rik van Duijn from DearBytes Explained a PoC ,“The DoublePulsar backdoor allows to inject and run any DLL (Dynamic Link Library), that way compromising the computer and using it for whatever purpose.
It is basically the default way computers are remotely managed in any environment, so a vulnerability in has huge impact.
It is installed using the ETERNALBLUE exploit that attacks SMB file-sharing services on Windows XP to Server 2008 R2.
That means to compromise a computer, it must be running a vulnerable version of Windows and expose an SMB service to the attacker.
The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a…
Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application websites,…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…
The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…
Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…
Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…