New Year, New NSA | NSA Helping Microsoft?

New Year, New NSA | NSA Helping Microsoft?

Technology has been progressing faster and faster over the years. What was a critical vulnerability in 2005 is now a redundant memory in the security industry keeping a “gentle” reminder of how important security is in the cyber industry.

exc-5e1eedd5348d0b3315fbdd7a

Technology has been progressing faster and faster over the years. What was a critical vulnerability in 2005 is now a redundant memory in the security industry keeping a “gentle” reminder of how important security is in the cyber industry.

The NSA is one of those agencies which have a very bad reputation in the cybersecurity industry holding back on found vulnerabilities to build up their arsenal of cyber-attacks. Back in April 14, 2017, the Shadow Brokers leaked hacking tools from the NSA which mainly affected the Windows SMB service resulting in Remote-Code-Execution (RCE). This vulnerability was exploited against millions of machines being used as a ransomware attack (WannaCry).

The leaked exploit was known as ‘EternalBlue’ and was released one month after Microsoft sent out a patch to fix the vulnerability.

Why am I mentioning an issue that happened almost 3 years ago? Very recently, the NSA has decided to help Microsoft identify a vulnerability! This vulnerability was to do with how windows identifies trusted sources. If exploited correctly, it could be used to aid in ransomware attacks.

“This is serious news, as the crypt32.dll is a module needed for securing the Microsoft Operating Systems. We still don’t know precisely what the bug is and how easily it could be exploited, as that hasn’t been fully disclosed yet, but there are some pointers online that can give us an idea,” – Boris Cipot, Senior Security Engineer.

This is a very interesting case due to the history the NSA has with Microsoft. It will be interesting to see the relationship between the two progress from here. The NSA could have easily weaponised this vulnerability and added it to their arsenal, but they decided not to and inform Microsoft instead.

It is recommended to ignore any emails to do with patching this vulnerability as ‘phishers’ tend to use this kind of circumstance to their advantage.

  • Latest Articles
Author Details
Penetration Tester at Hedgehog Security

Michael is an OSCP qualified Penetration Tester based in our Gibraltar office. Outside of work Michael is a keen power lifter and photographer.

  • Cisco’s recent update fixes high-severity flaws
  • Ukrainian Malware Spreading Exposed on Dark Web

    Malware is known as ‘Blackout’ was found in Ukraine in 2015 affecting power plants and in turn causing blackouts. This specific malware target SSH keys to gain access to the victim’s machine unnoticed.

  • Intel Vulnerability Enables Multiple Issues

    Intel is warning users of a high severity flaw found within their firmware of it’s ‘Converged Security and Management Engine’ (CSME) which is used to power Intel’s ‘Active Management System’ hardware for the purpose of remote out-of-band management to consumers. This flaw could enable an attacker to conduct Privilege Escalation, Information Disclosure and Denial of Service.

  • Dell SupportAssist-ing Hackers

    A recent vulnerability found in Dell’s SupportaAssist software found that if exploited correctly can lead to code execution for unprivileged users. This is known as an uncontrolled search path vulnerability (CVE-2020-5316).

  • Android Bluetooth Critical RCE Flaw

    A recent vulnerability was found by researchers from a German security firm. Fixes are available via the Android February 2020 Security Bulletin. The bug is identified as CVE-2020-002; when exploited can result in remote-code-execution without any user interaction with elevated privileges.

  • WhatsApp? WhatsPatch? WhatsCrack? | WhatsApp Critical Flaw

    A security researcher by the name of Gal Weizman from PerimeterX found multiple flaws within WhatsApp that could potentially lead to remote-code-execution (RCE). The flaws enabled vulnerabilities such as Open-Redirect, Persistent-XSS, CSP-Bypass and read privileges from the Local File System (LFS).

  • Google Exposed Personal Photos

    It has recently been reported that not long ago, last Thanksgiving, Google had a bug which caused personal photos to be shared to complete strangers. ‘The Chocolate Factory’ made note of this issue and began notifying users that there is a bug in Google Photos data-archiving tool, Takeout.

  • Handout the CacheOut

    A recent finding of a microarchitectural Data Sampling (MDS) vulnerability within Intel’s CPU’s found by researchers have now released a Proof-of-Concept (PoC) code. This was not the only recent vulnerability found; however, it is the most severe with a Medium risk vulnerability.

  • Juice Jacking? The New but Old Revolution of Hacking Attacks!

    Juice Jacking is an attack-type that involves plugging your phone into public sockets for “charging purposes”. The truth behind these sockets is the installation of malware on your phones and other electronic devices of unsuspecting users.

  • Mistakes were Made | Intel Privilege Escalation

    Intel is a very large corporation most known for their processors. A recent flaw within Intel’s ‘VTune Profiler’ software could enable anyone to upgrade their privileges if exploited correctly. This software is a performance monitoring & analysis application mainly used for serial and multi threaded application developers.

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest
Scroll to Top