Categories: Security

NSA Malware ‘Infects Nearly 200,000 Systems’

An attack tool developed by the US’ National Security Agency (NSA) and released online earlier this month has already been used to infect nearly 200,000 systems worldwide, with the number rising by nearly 80,000 over the past weekend alone, researchers said.

The Doublepulsar exploit tool had infected 106,410 systems as of Friday, with the figure rising to 183,107 by Monday, said Binary Edge, a Swiss computer security firm.

‘Beautifully designed’

The US was by far the biggest target, with nearly 70,000 infections, followed by Hong Kong with fewer than 10,000.

Binary Edge said it scanned Internet hosts worldwide that had port 445 open – the port used by Doublepulsar – and applied a detection script developed by security company Countercept.

Binary Edge said Doublepulsar is “beautifully designed” and doesn’t require much technical sophistication to use, meaning online criminals have been able to rapidly adopt it since its release on 7 April.

The findings are a particular cause for concern since the security vulnerability exploited by Doublepulsar was patched in the MS17-010 fix released in Microsoft’s March update, a full month before the exploit was made public.

Ease of use

Doublepulsar is the payload of a number of NSA infection tools and once exploited allows an attacker to execute arbitrary code, effectively delivering complete control of the system.

Industry observers compared it to Conficker, a computer worm first detected in 2008 that spread widely and has proven particularly difficult to eradicate.

The difference, however, is that Doublepulsar and the other NSA tools are so easy to exploit, with researchers noting that step-by-step walkthroughs on their use have been posted on YouTube.

Doublepulsar and other materials allegedly stolen from the NSA have been published over the past several months by a group calling itself Shadow Brokers.

The most recent release included presentations and other materials suggesting the NSA compromised systems linked to the international SWIFT money transfer system in order to trace transfers linked to criminal or militant groups.

Do you know all about security in 2017? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Raimondo Downplays Huawei Smartphone Chip

US Commerce Secretary Gina Raimondo says Huawei's flagship smartphone chip 'years behind' US technology, shows…

10 hours ago

Cloud Companies Reject Broadcom VMware Pricing Changes

Cloud companies, business user groups say Broadcom price changes do not address their concerns, as…

11 hours ago

UK Lawsuit Claims Grindr Shared HIV Status

Dating app Grindr sued over claims it shared sensitive user data, including HIV status, with…

11 hours ago

Meta Opens Quest VR OS To Third Party Gadget Makers

Meta Platforms opens operating system behind Quest virtual reality headsets to third parties amidst competition…

12 hours ago

EU Prepares Action Against ‘Addictive’ TikTok Lite Features

European Commission may ban rewards feature in recently launched TikTok Lite that it calls 'toxic…

12 hours ago

TikTok Says New US Ban Effort Would ‘Trample Free Speech’

US House of Representatives passes new bill combining TikTok measures with foreign aid, may face…

1 day ago