The quick version:
You may or may not have heard the news: a group calling themselves “The Shadow Brokers” has released an archive of exploits purportedly used by the NSA’s TAO (Tailored Access Group) from 2013. These exploits target all versions of Windows up to Windows 8, and Windows Server 2008 R2 currently, though it is likely that Windows 10 and Windows Server 2012+ are also vulnerable. The level of compromise possible with the released code and the relative ease of deployment, combined with the potential harm to protected systems are the reason we feel the need to explain the problem, warn you of the potential and provide some suggestions about how you may protect your vulnerable assets.
Microsoft has released a patch, as of a month ago under the MS17-010 Bulletin, which addresses many but not all of the more serious vulnerabilities revealed in the archive. If you haven’t applied this patch to all Windows computers, or are not sure, quit reading this and go patch now. The rest can wait. This is that important.
“Okay, we’re patched. What was all the fuss about?”
Let start with the Shadow Brokers. Last August, this person or group posted exploits to Github targeting Linux systems. The Shadow Brokers stated they had stolen these tools from the NSA’s “Tailored Access Operations” group, which we know through the Snowden leaks to be the NSA’s Red Team operations, the group which oversees compromising computer networks, aka CNE (Computer Network Exploitation.) The Shadow Brokers used this initial dump as proof that their content was real, and asked for bids on the rest of the package promising Windows 0-day (vulnerabilities with no existing patches at time of release) exploits were included.
Again in October, January, and April 8th, they posted additional exploits though they were mostly older exploits and less interesting from a larger security impact. The Shadow Brokers maintained, however, that they had in their possession 0-day exploits for Microsoft Windows systems, and continued to ask for payment.
More about the Shadow Brokers and their history:
On April 14th, the Friday before Easter weekend, the Shadow Brokers released their largest and most significant dump yet. Initial reports suggested that this data dump included 0-day exploits targeting Windows 8 and earlier, and Windows Server 2008 R2 and earlier. Further research revealed that in fact Microsoft HAD patched the vulnerabilities in MS17-010, released exactly one month prior on March 14th. Included in this latest dump are multiple exploits for Microsoft SMB (the underlying file sharing protocol for Windows), Lotus Notes, and a smattering of Linux, Unix, Solaris, and RedHat exploits. Additionally, tools for encoding these exploits were included for bypassing antivirus signatures as well as command and control (C2) tools.
I can say without hyperbole that the full package gives any script kiddy nation-state level tools for compromising Windows domains. This is point and click hacking for the masses.
“How bad is it?”
This is the largest single dump of exploits the industry has ever seen. Combined with all the tools to encode the payload, and C2 to control the victims, we’re looking at very simple, extremely effective, and highly dangerous tools in the hands of anyone. Most of our clients know to block SMB at the firewall, though it’s not entirely unprecendented. Tools like Shodan.io will allow potential attackers to find all available targets on the internet and exploit them with this toolset. As for systems inside of a firewall, If it hasn’t happened already, those systems left unpatched WILL be compromised.
“What can we do?”
Patch. Patch now. Block ports 445 and 139 at the firewall. Then, disable SMBv1 network wide as a precautionary measure.
If you are a Critical Informatics Critical Insight customer, you should know that Critical Informatics is already monitoring networks for specific indicators related to these tools through our Critical Insight product. Our analysts have been working through the weekend since this archive was released, discovering the methods and indicators used in these toolsets. Rest assured, if we see any sign that one of the released exploits are active on any monitored network, we will keep your phone ringing and email pinging until it’s been neutralized.
An initial analysis by TrustedSec:
In-depth by Ars Technica:
Microsoft denies being alerted by the NSA about the Shadow Brokers stolen exploits:
In Microsoft’s own words:
Cisco ASA’s also affected:
Table of Exploits leaked:
Type your search and press enter
- Threat Intelligence
- Happy Hour
- InfoSec 101
- Security Awareness
- Public Sector
- Financial Services
- Press Release
@critinformatics | Sep 21, 2018#ICYMI: Our technology is the foundation of the @pisces_nw project, which provides no-cost #cybersecurity event monitoring to #localgovernments while training the next generation of #securityanalysts in WA State. https://t.co/goUE7p2rXQ https://t.co/jGp9hQrKiS
@critinformatics | Sep 20, 2018[EVENT] We’re going to @techtalksummits in #Seattle next Wed., 9/26, at El Gaucho, and we’d like you to join us! Register today for an engaging evening of IT discussions, w/ free drinks and apps—Get there in time to hear @seattlemkh speak at 7 PM! https://t.co/V7Zp8XgNqd https://t.co/471r9FKiHY
@critinformatics | Sep 20, 2018#ICYMI [VIDEO] Check out this month’s #NewsJacker w/ @seattlemkh for the latest #InfoSecNews on #SmartCity & #Aviation #vulnerabilities, #ElectionSecurity, #WannaCry culprits, #NationStates, & more. #ITSecurity #InfoSec #ThursdayThoughts https://t.co/uREOTBFN7P https://t.co/f5V3OOBFCA
@critinformatics | Sep 19, 2018RT @FileFacets: #GDPR - Another Y2K or Real Apocalypse? Learn the essential #cybersecurity requirements that U.S. companies need to know to…