Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

DoublePulsar

From Wikipedia, the free encyclopedia
Backdoor implant tool
For the only known double pulsar star system, seePSR J0737-3039.
DoublePulsar
Malware details
Technical name
FamilyPulsar (backdoor family)
AuthorEquation Group

DoublePulsar is abackdoor implant tool developed by the U.S.National Security Agency's (NSA)Equation Group that was leaked byThe Shadow Brokers in early 2017.[3][citation needed] The tool infected more than 200,000Microsoft Windowscomputers in only a few weeks,[4][5][3][6][7] and was used alongsideEternalBlue in the May 2017WannaCry ransomware attack.[8][9][10] A variant of DoublePulsar was first seen in the wild in March 2016, as discovered by Symantec.[11]

Sean Dillon, senior analyst of security companyRiskSense Inc., first dissected and inspected DoublePulsar.[12][13] He said that the NSA exploits are "10 times worse" than theHeartbleed security bug, and use DoublePulsar as the primarypayload. DoublePulsar runs inkernel mode, which grants cybercriminals a high level of control over the computer system.[5] Once installed, it uses three commands:ping,kill, andexec, the latter of which can be used to loadmalware onto the system.[12]

References

[edit]
  1. ^"Trojan.Darkpulsar".Symantec. Archived fromthe original on 3 October 2019.
  2. ^"Win32/Equation.DarkPulsar.A | ESET Virusradar".www.virusradar.com.
  3. ^ab"DoublePulsar malware spreading rapidly in the wild following Shadow Brokers dump". 25 April 2017.
  4. ^Sterling, Bruce."Double Pulsar NSA leaked hacks in the wild".Wired.
  5. ^ab"Seriously, Beware the 'Shadow Brokers'".Bloomberg. 4 May 2017 – via www.bloomberg.com.
  6. ^"Wana Decrypt0r Ransomware Using NSA Exploit Leaked by Shadow Brokers Is on a Rampage".
  7. ^">10,000 Windows computers may be infected by advanced NSA backdoor". 21 April 2017.
  8. ^Cameron, Dell (13 May 2017)."Today's Massive Ransomware Attack Was Mostly Preventable; Here's How To Avoid It".
  9. ^Fox-Brewster, Thomas."How One Simple Trick Just Put Out That Huge Ransomware Fire".Forbes.
  10. ^"Player 3 Has Entered the Game: Say Hello to 'WannaCry'".blog.talosintelligence.com. 12 May 2017. Retrieved2017-05-15.
  11. ^"Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak".arstechnica.com. 7 May 2019. Retrieved2019-05-07.
  12. ^ab"DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis".zerosum0x0.blogspot.com. 21 April 2017. Retrieved2017-05-16.
  13. ^"NSA's DoublePulsar Kernel Exploit In Use Internet-Wide".threatpost.com. 24 April 2017. Retrieved2017-05-16.
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Stub icon

Thismalware-related article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=DoublePulsar&oldid=1331302765"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp