Microsoft Patched Leaked Zero Days

Tuesday, April 18, 2017 @ 03:04 PM gHale


Shadow Brokers posted online a set of tools belonging to the National Security Agency (NSA) and used to break into Windows systems across the world. But Microsoft had already issued patches for any of the vulnerabilities.

Apparently, the hacking organization stole the hacking software from the NSA last summer. The tools can end up used for hacking the majority of Windows versions currently in use with the exception of Windows 10.

RELATED STORIES
Microsoft Clears Zero Days
Office Zero Day Used in Attacks
Office Zero Day a ‘Logical Bug’
SANS: Know the Security Mission

The leaked data, however, appears to also include exploits aimed at Windows 10 systems, though the majority of hacking tools are for older versions of the operating system, such as Windows XP, Windows 7, and Windows 8.1. There are also hacking tools for Windows Server versions.

With the hacking tools now available online, the number of attacks aimed at Windows systems is very likely to skyrocket.

The Shadow Brokers (TSB) is a hacker group originating in summer 2016. They published several NSA leaks and hacking tools including Zero Day exploits. Specifically, exploits and vulnerabilities targeting enterprise firewalls, anti-virus products and Microsoft products.

To counteract the hack, Microsoft said it already had fixed most of the exploits.

“Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers,” said Microsoft Principal Security Group Manager Phillip Misner.

“Our engineers have investigated the disclosed exploits, and most of the exploits are already patched,” he said.

Three of the dozen Zero Day vulnerabilities aired by the hackers, which they claimed were part of a large cache of data leaked from the NSA, did not work at all on Windows 7 and above.

“Customers still running prior versions of these products are encouraged to upgrade to a supported offering,” Misner said.



Leave a Reply

You must be logged in to post a comment.