Security Market Segment LS
Monday, 22 October 2018 08:31

Windows servers still infected by DarkPulsar NSA exploit

By
Windows servers still infected by DarkPulsar NSA exploit Pixabay

Researchers from security outfit Kaspersky Lab say they have found about 50 systems infected by the DarkPulsar malware, part of the NSA exploits which were dumped online by a group calling itself the Shadow Brokers in 2017.

A research brief written by Andrey Dolgushev, Dmitry Tarakanov and Vasily Berdnikov said DarkPulsar was in the implants category of the dump which included two frameworks called DanderSpritz and FuzzBunch. DarkPulsar was not a backdoor in itself, but just the administrative part of a backdoor.

They said the FuzzBunch framework had various plugins designed to analyse victims, exploit vulnerabilities and schedule tasks while DanderSpritz was designed to examine machines that had been taken over and gather intelligence.

Together, they formed a powerful platform for cyber-espionage.

The trio said they had found about 50 victims, but theorised that the number must have been much higher when DanderSpritz and FuzzBunch were in active use.

They based this on the fact that the DanderSpritz interface allows an attacker to manage a number of victims simultaneously. Additionally, there was a tendency for attackers to delete malware from systems which they were no longer using, so the 50 victims may have been those who were forgotten.

Dolgushev, Tarakanov and Berdnikov said the victims they had found were all running Windows 2003 Server or Windows 2008 Server, and located in Russia, Iran and Egypt. The victims were all connected to the nuclear energy, telecommunications, IT, aerospace and research and development sectors.

They said DarkPulsar showed evidence of being developed by competent people who had plenty of money to spend on creating advanced malware that would persist on a system.

The researchers said DarkPulsar also included functionality to disable NTLM protocol security meaning that the need to enter a username and password during authentication was bypassed, indicating that an attack using this malware was meant to be a long-term one.

There was one bright note, however. "...to exploit this backdoor on infected victims, the attackers need to know the private RSA key which pairs to the public key embedded in the backdoor," the Kaspersky trio said. "It means that no one except [the] real DarkPulsar’s managers can exploit compromised systems."

They recommended the following measures to avoid infections:

  • Keep your security products up to date;
  • Do not turn security product components off;
  • Keep your OS updated;
  • Install all security patches asap;
  • Use special traffic analysis tools and pay attention to all encrypted traffic;
  • Do not use weak passwords or the same password for several endpoints;
  • Use complex passwords;
  • Do not allow remote connections to endpoints with administration rights; and
  • Do not allow domain administrators to be local administrators with the same credentials.

Subscribe to ITWIRE UPDATE Newsletter here

Now’s the Time for 400G Migration

The optical fibre community is anxiously awaiting the benefits that 400G capacity per wavelength will bring to existing and future fibre optic networks.

Nearly every business wants to leverage the latest in digital offerings to remain competitive in their respective markets and to provide support for fast and ever-increasing demands for data capacity. 400G is the answer.

Initial challenges are associated with supporting such project and upgrades to fulfil the promise of higher-capacity transport.

The foundation of optical networking infrastructure includes coherent optical transceivers and digital signal processing (DSP), mux/demux, ROADM, and optical amplifiers, all of which must be able to support 400G capacity.

With today’s proprietary power-hungry and high cost transceivers and DSP, how is migration to 400G networks going to be a viable option?

PacketLight's next-generation standardised solutions may be the answer. Click below to read the full article.

CLICK HERE!

WEBINAR PROMOTION ON ITWIRE: It's all about webinars

These days our customers Advertising & Marketing campaigns are mainly focussed on webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

We have a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments