Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    NSA Bank System Tracking Revealed in Shadow Brokers’ Zero-Day List

    By
    WAYNE RASH
    -
    April 17, 2017
    Share
    Facebook
    Twitter
    Linkedin
      Word Flaw Cyber-Spy

      When the hacker group Shadow Brokers released its latest list of Windows vulnerabilities last week, much of the security community was aghast. The new leaks listed a series of hacking tools aimed at those Windows vulnerabilities along with tools aimed at other services and operating systems, ostensibly stolen from the National Security Agency several months ago.

      The leaks appeared to be so serious that some security researchers were calling it a Windows apocalypse. Then on April 14, Microsoft spoiled all that fun by pointing out that the vulnerabilities that everyone was all atwitter over had actually been patched a month earlier. This meant that if you were using a machine that had been patched, your machine shouldn’t be vulnerable any more.

      Microsoft’s Phillip Misner, Principal Security Group Manager for the Microsoft Security Response Center explained in his blog what was going on. “Most of the exploits that were disclosed fall into vulnerabilities that are already patched in our supported products,” he said. Misner provided a chart of the exploits and of the updates that fixed them.

      Code Name

      Solution

      “EternalBlue”

      Addressed by MS17-010

      “EmeraldThread”

      Addressed by MS10-061

      “EternalChampion”

      Addressed by CVE-2017-0146 & CVE-2017-0147

      “ErraticGopher”

      Addressed prior to the release of Windows Vista

      “EsikmoRoll”

      Addressed by MS14-068

      “EternalRomance”

      Addressed by MS17-010

      “EducatedScholar”

      Addressed by MS09-050

      “EternalSynergy”

      Addressed by MS17-010

      “EclipsedWing”

      Addressed by MS08-067

      It’s worth noting that not only was the information from Shadow Brokers not an apocalypse, some of the vulnerabilities were nearly a decade old. One was fixed before the days of Windows Vista. The most recent fix was sent out in March, 2017, about a month before the revelations.

      Originally Shadow Brokers tried to auction the vulnerabilities and the tools that were used to exploit them, but there were no takers. At the time it was clear that many of those tools were already known, but on further examination, it seems that they simply were old.

      But that doesn’t mean that there isn’t any risk. While Windows computers that run up to date versions of Windows aren’t at risk for these exploits, there are a lot of machines that are still running Windows XP and are no longer supported by Microsoft, and these machines are vulnerable.

      In addition, enterprise implementations of Windows 7 and Windows 10 are frequently not up to date because the IT departments delay deployments of security patches for as long as several months to confirm that any updates don’t break anything. Those machines may be vulnerable and will be highly attractive to cyber-attackers.

      This means that enterprise IT departments should identify the updates from Microsoft that contain the fixes in the list and apply them as soon as possible. While it pays to be careful when making changes to mission-critical software, it doesn’t pay when you know those fixes are related to real attacks.

      Depending on the nature of the enterprise, there are other threats that go along with the revelations as well. The Shadow Brokers claim that their hacking tools came from the NSA, which uses them to spy on companies outside the U.S.

      If your enterprise is one of the many that are based outside the U.S. or have interests in foreign nations, then it might be of interest to the NSA and vulnerability may suddenly have become critical.

      While the Windows exploits are getting the most press, there’s actually a potentially more serious part of the Shadow Brokers release that’s not getting a lot of attention. Some of the vulnerabilities seem to show that the NSA, if that’s actually where the hacking tools came from, has penetrated part of the SWIFT network through a bank in the middle east.

      SWIFT is a global messaging network based in Belgium used by banks to transfer funds. The ability to penetrate the SWIFT messaging network then gives the NSA the ability to track funds as they move around the financial world. Part of this effort has been known for years as the Terrorist Financial Tracking Network, but the details of how it works have always been shadowy.

      While there are agreements between the U.S. intelligence community and the EU to share data from the SWIFT network, the amount of sharing that can take place is limited. By penetrating the network itself, the intelligence agencies can get information that’s very detailed and very current. Unfortunately, doing so also violates the agreements between the U.S. and the EU.

      By showing that the NSA may have violated the existing agreements, the implementation of the Privacy Shield agreement between the U.S. and the EU may be at risk. This is a significant problem because companies on both sides of the Atlantic depend on Privacy Shield, which regulates what type of sharing of personal information is allowed, and under what circumstances. Without such an agreement, commerce between them is impaired.

      So what all of this boils down to is that the Shadow Brokers revelations are a big problem, but not for the reasons originally thought. Microsoft fixed the vulnerabilities, although exactly how the company learned of these vulnerabilities and the tools to exploit them is unclear. But the other part revelations about the NSA’s penetration of the SWIFT network that most ignored at first could cause the U.S. and the intelligence community a very big problem indeed.

      What’s unfortunate is that we may never actually know just how much of a problem it turned out to be and ultimately what was done about it.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×