Fact-checked by Grok 2 weeks ago

DoublePulsar


DoublePulsar is a fileless -mode backdoor implant targeting vulnerabilities in Microsoft Windows Server Message Block () protocol implementations, enabling remote without writing to disk. It operates by injecting into memory, specifically hooking the SMB dispatch table to intercept and redirect communications for delivery. Developed as part of the Equation Group's offensive toolkit—widely attributed to the U.S. —DoublePulsar was publicly exposed in April 2017 through a by hacking group. Following its disclosure, the implant rapidly proliferated, infecting over 200,000 systems within weeks as cybercriminals exploited it alongside tools like for propagation in campaigns such as WannaCry and NotPetya. Its design emphasized stealth and efficiency, residing entirely in to complicate forensic detection and antivirus scanning. The highlighted vulnerabilities in government-held exploits, as state-sponsored tools were repurposed by non-state actors, amplifying global cybersecurity risks.

Origins and Development

NSA Equation Group Involvement

DoublePulsar is a kernel-level backdoor implant developed by the , an advanced actor attributed to the U.S. (NSA), specifically its (TAO) unit. Kaspersky Lab's February 2015 analysis of Equation Group operations highlighted the group's use of proprietary toolkits with unique encryption and modular payloads, exhibiting code reuse patterns akin to NSA-linked malware such as and , which employed similar low-level drivers and firmware infection techniques. This attribution relies on forensic indicators including custom DLL reflective loading and anti-analysis evasion, distinguishing Equation Group tools from commercial or non-state actors. The backdoor formed a core component of the Equation Group's FuzzBunch exploitation framework, which automates vulnerability chaining for remote execution. DoublePulsar installs as ring-0 via protocol negotiation flaws, establishing a for secondary injection while maintaining process integrity to evade detection. publicly released FuzzBunch, including DoublePulsar binaries and configuration files, on April 14, 2017, exposing operational details like hardcoded NSA staging servers and listener ports tailored for intelligence persistence. audits post-leak confirmed high-fidelity craftsmanship, such as randomized magic bytes for validation and minimal footprint to support long-term surveillance, aligning with Equation Group's documented decade-plus history of global targeting. Evidence of pre-leak deployment underscores Equation Group origins, with attributing DoublePulsar variants to the Chinese-linked Buckeye APT as early as March 2016—over a year before the Shadow Brokers disclosure—indicating theft or independent reverse-engineering from NSA arsenals. While the NSA has not confirmed development, the tools' integration with zero-day exploits like and absence of commercial equivalents reinforce technical attribution to a resource-intensive state like the NSA, rather than opportunistic cybercriminals.

Technical Design and Functionality

DoublePulsar operates as a kernel-mode (Ring 0) backdoor implant targeting the Windows server implementation in the srv.sys driver. It is designed for multi-architecture support, accommodating both x86 and x64 systems, and is typically deployed following exploitation of vulnerabilities such as MS17-010 (). Upon successful exploitation, the initial executes in space, where it locates the base address of using the Kernel Processor Control Region (KPCR) and (IDT), then identifies srv.sys via ZwQuerySystemInformation. The subsequently hooks the SrvTransaction2DispatchTable at index 14, overriding the SrvTransactionNotImplemented function to intercept specific Trans2 SESSION_SETUP requests for command-and-control () operations. The implant's communication exploits the protocol's Trans2 subcommand, embedding commands within SESSION_SETUP requests without requiring authentication. Key opcodes dictate functionality: 0x23 for pinging the implant to verify presence, 0xC8 for executing , and 0x77 for self-removal (kill). Payloads, such as or DLLs, are delivered in chunks of up to 4096 bytes, XORed with a key derived from the header's Signature1 field (e.g., calculated as a for ). Execution parameters include total payload size, chunk offset, and data length, all obfuscated via the same XOR mechanism. Status responses are conveyed through the delta between SMB Multiplex IDs, using codes like 0x10 for success, 0x20 for invalid parameters, or 0x30 for allocation failure. For payload execution, DoublePulsar allocates executable kernel memory and injects shellcode directly into Ring 0, enabling with kernel privileges. It also supports user-mode by bootstrapping via kernel shellcode that maps the DLL into target processes, leveraging techniques analyzed in related tools. The implant maintains stealth by avoiding disk writes and relying solely on in-memory modifications, rendering it non-persistent across reboots unless reinstalled. Detection can occur via anomalous traffic patterns or active scanning for the hooked dispatch table, while neutralization involves issuing the kill or applying system patches.

Leak and Initial Detection

Shadow Brokers Disclosure

The , a hacker group that first surfaced in August 2016 with claims of possessing (NSA) hacking tools, escalated their disclosures in April 2017 by releasing a substantial of alleged exploits and implants. On April 14, 2017—coinciding with —the group published a password-protected dump titled "Lost in Translation," which included over 300 megabytes of data containing Windows-specific remote code execution exploits and backdoors, prominently featuring DoublePulsar as a stealthy SMB () implant. The was made available via the group's Tumblr account and mirrored on platforms like , with the password "CrDj"("CrackAdea.2" in leetspeak) revealed shortly after to facilitate access. DoublePulsar was disclosed as a modular kernel-level backdoor designed to inject arbitrary DLLs into processes on vulnerable Windows systems (primarily versions from to Server 2008), enabling persistent remote access without detectable network traffic beyond initial exploitation. The tool's binaries, including installer and scanner components, were bundled alongside exploits like (targeting MS17-010), highlighting its intended use in post-exploitation chains for espionage operations attributed to the NSA's unit. Security researchers quickly verified the tools' authenticity through code analysis, noting similarities to previously documented and confirming DoublePulsar's low detection footprint due to its reflective mechanism. The disclosure prompted immediate warnings from cybersecurity firms, as the tools targeted unpatched enterprise infrastructure, with DoublePulsar scanners revealing widespread prior infections dating back to at least 2016. Unlike earlier teasers, which involved auctions for access, this release was unconditional, potentially motivated by geopolitical tensions or insider motives, though the group's opaque communications—often in broken English—provided no explicit rationale beyond mocking U.S. intelligence. The event marked a rare public breach of classified offensive cyber capabilities, shifting them from state-exclusive use to democratized availability for cybercriminals and adversaries.

Microsoft's Analysis and Naming

Microsoft security researchers first publicly detailed their analysis of DoublePulsar in response to the outbreak on May 12, 2017, identifying it as a kernel-level backdoor adapted from tools leaked by . In the attack chain, WannaCry exploited the vulnerability CVE-2017-0145 via to gain initial code execution, after which DoublePulsar was deployed to inject and run the ransomware dropper in on both x86 and x64 Windows architectures, enabling lateral without disk artifacts. The designation "DoublePulsar" originated from the implant's file naming and codename within the NSA Equation Group's FuzzBunch exploitation framework, as exposed in the ' April 2017 data dump. incorporated this established name into their threat intelligence, classifying the backdoor as Trojan:Win32/DoublePulsar for detection by , which scans for its behavioral indicators and removes infections by terminating associated processes and cleaning hooks. Further examinations characterized DoublePulsar as a ring-0 (kernel-mode) providing three primary commands—ping for status checks, kill to uninstall itself, and exec for arbitrary execution—allowing attackers to maintain and load secondary payloads stealthily. This design exploited unpatched systems vulnerable to , with emphasizing that applying security update MS17-010 rendered systems immune to initial infection, though signatures addressed remnant implants.

Deployment and Exploitation

Integration with EternalBlue

EternalBlue exploits a vulnerability in the Windows SMBv1 implementation (CVE-2017-0144), enabling remote code execution on affected systems such as and Server 2008. This initial access allows attackers to deploy DoublePulsar as a kernel-mode backdoor implant, which hooks into the SMB driver (srv.sys) to facilitate stealthy over port 445 without requiring modifications. The integration occurs through EternalBlue's , which executes post-exploit to invoke DoublePulsar's routine. This routine patches memory to redirect specific SMB transaction subcommands, creating a for subsequent commands: a "" mode verifies presence via a magic value response, while "payload" mode loads arbitrary or DLLs into space. Developed by the NSA's , this exploit-implant chain was leaked by on April 14, 2017, enabling widespread unauthorized use. Microsoft addressed the underlying vulnerability via Security Bulletin MS17-010, released on March 14, 2017, rendering patched systems resistant to and thus blocking DoublePulsar installation. Unpatched systems remained susceptible, with infection attempts surging immediately after , infecting over 76,000 additional machines between April 21 and 24, 2017. The design emphasized operational stealth, as DoublePulsar evades traditional antivirus detection by operating entirely in memory and mimicking legitimate traffic.

Role in WannaCry Attack

The WannaCry ransomware worm, first detected on May 12, 2017, incorporated DoublePulsar into its infection chain to facilitate payload delivery and lateral propagation across vulnerable Windows systems. Upon targeting a host via SMB port 445 scanning, WannaCry's code initially probes for an existing DoublePulsar installation by sending a specific transaction to the SMB service; a response indicating the backdoor's presence (such as STATUS_NOT_IMPLEMENTED) allows direct DLL injection of the ransomware payload without requiring full remote code execution privileges. This mechanism exploited prior DoublePulsar deployments, which had been silently installed on numerous systems through earlier EternalBlue exploitations or NSA Equation Group operations, enabling faster infection rates than relying solely on the vulnerability alone. In cases where DoublePulsar was not present, WannaCry fell back to the exploit (CVE-2017-0144) to achieve initial kernel-level code execution, installing the backdoor as an intermediate step before injecting the WannaCrypt0r payload responsible for encryption and ransom demands. DoublePulsar's design as a reflective DLL loader implant minimized detection risks by operating in with low overhead, allowing WannaCry to self-propagate worm-like across networks without user interaction or additional authentication. This integration amplified the attack's velocity, as evidenced by early reports of infections spreading to over 100,000 systems within hours, particularly on unpatched Windows versions like XP, 7, and Server 2003. The use of DoublePulsar highlighted the risks of persistent backdoors from nation-state tools entering wider criminal ecosystems post-leak, with cybersecurity analyses noting that pre-existing installations from Shadow Brokers-disclosed exploits in April 2017 contributed to WannaCry's initial surge before widespread patching. Microsoft's emergency patches for unsupported systems on May 13, 2017, alongside kill-switch domain registration, eventually curtailed the outbreak, but DoublePulsar's role underscored vulnerabilities in legacy infrastructure and delayed updates.

Impact and Consequences

Global Infection Scale

In the weeks following ' public disclosure of DoublePulsar on April 14, 2017, security researchers observed a rapid increase in infections as cybercriminals scanned for and exploited vulnerable Windows systems lacking patches for the underlying SMB vulnerability (CVE-2017-0144). By April 21, 2017, scans detected over 36,000 infected computers worldwide. This number escalated quickly, with estimates reaching approximately 56,000 hosts by April 25, 2017, based on global network probes using detection scripts. Further assessments in late April 2017 indicated even broader prevalence, with one analysis identifying around 150,000 Windows machines compromised, while another reported nearly 80,000 new infections over a single weekend. By April 24, 2017, cumulative infections exceeded 200,000 systems globally, reflecting opportunistic deployment by multiple threat actors beyond state-sponsored operations. These figures derived from internet-wide scans targeting DoublePulsar's SMB port 445 behavior, highlighting its persistence on unpatched systems running Windows versions from XP to Server 2016. Infections were geographically dispersed, affecting systems across , , , and other regions, though exact breakdowns varied by scan methodology and remained dominated by regions with high legacy Windows deployment, such as enterprise networks and unmaintained infrastructure. Post-patch proliferation slowed after Microsoft's March 14, 2017, fix (MS17-010), but residual infections lingered on air-gapped or delayed-update environments, with limited reports of ongoing activity into 2018 from data. No verified mass-scale infections have been documented since, underscoring the tool's reliance on the patched for initial access.

Economic and Geopolitical Effects

The exploitation of DoublePulsar, often in tandem with the vulnerability, underpinned high-profile campaigns like WannaCry in May 2017 and NotPetya in June 2017, inflicting substantial economic damages worldwide. WannaCry alone is estimated to have caused global losses exceeding $4 billion, encompassing direct demands, system recovery costs, and operational disruptions across sectors including healthcare, manufacturing, and logistics. NotPetya amplified these effects, with damages surpassing $10 billion due to widespread encryption of critical infrastructure, supply chain interruptions, and prolonged downtime for multinational firms such as shipping giant and pharmaceutical company Merck. These incidents highlighted the amplified financial risks from unpatched systems, where DoublePulsar's backdoor functionality enabled rapid lateral movement and payload deployment, exacerbating recovery expenses that often dwarfed initial amounts. Geopolitically, DoublePulsar's role in WannaCry—attributed by U.S. authorities to North Korea's —intensified diplomatic pressures, including calls for enhanced and cybersecurity norms amid fears of state-sponsored . NotPetya, traced to Russia's unit , targeted entities as part of broader hybrid conflict tactics but spilled over globally, blurring lines between localized geopolitical maneuvering and indiscriminate disruption, which strained alliances and prompted reevaluations of cyber attribution in interstate relations. ' 2017 disclosure of DoublePulsar and related NSA tools further eroded confidence in U.S. intelligence practices, fueling debates over vulnerability stockpiling and potentially emboldening adversaries by democratizing advanced exploit capabilities, as evidenced by subsequent nation-state adaptations. These events collectively underscored causal linkages between offensive cyber tools and escalatory risks in global power dynamics.

Mitigation and Technical Countermeasures

Patching and Vulnerability Remediation

Microsoft issued Security Bulletin MS17-010 on March 14, 2017, providing a critical security update that resolves multiple remote code execution vulnerabilities in the Server Message Block version 1 (SMBv1) protocol, specifically CVE-2017-0141 through CVE-2017-0148, with EternalBlue targeting CVE-2017-0144. This patch prevents attackers from exploiting the buffer overflow in SMBv1 to gain code execution and install backdoors like DoublePulsar on unpatched Windows systems, including Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, and Windows 10. The update modifies how SMBv1 handles specially crafted packets to block the memory corruption enabling kernel-level implants such as DoublePulsar, which operates as a reflective mechanism without writing to disk. Applying MS17-010 requires administrative privileges and a system restart to fully mitigate the vulnerability, as the patch alters core SMB server components. Verification of installation can be confirmed via history, the KB article number (e.g., KB4012212 for ), or by checking registry keys and file versions as outlined in Microsoft's guidance. In response to the widespread exploitation during the starting May 12, 2017, released out-of-band patches for end-of-support operating systems on May 13, 2017, including (KB4012598), , , and , despite these systems having reached end-of-life years earlier. These exceptional updates addressed the same SMBv1 flaws, underscoring the public risk posed by unpatched legacy systems vulnerable to DoublePulsar deployment. Beyond patching, remediation best practices include disabling SMBv1 protocol via commands like Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol, restricting traffic to trusted networks through firewalls, and auditing systems for unnecessary . Failure to apply these measures left an estimated 10-15% of global Windows systems exposed as of mid-2017, per vulnerability scanning data from security firms.

Detection and Removal Techniques

Detection of the DoublePulsar backdoor, a fileless kernel-mode implant, primarily relies on network-based scanning of responses, as it lacks persistent files on disk. Security tools such as Tenable's Nessus (plugin ID 99439) and Nessus Monitor (formerly PVS, plugin ID 700059) identify compromised systems by sending crafted trans2 SESSION_SETUP requests and analyzing the Multiplex ID in responses: an ID of 81 indicates infection, while 65 signifies a clean system. Open-source scripts, such as those developed by Countercept and WithSecure Labs, implement a non-authenticated "ping" to sweep networks for the implant by replicating its response patterns, requiring tools like masscan for IP discovery and supporting both and RDP protocols. Intrusion prevention systems, including FortiGuard Labs' signatures, can also flag DoublePulsar activity in traffic. detects it as Trojan:Win32/DoublePulsar through behavioral analysis suitable for fileless threats. Removal techniques exploit the implant's memory-resident nature and built-in uninstall mechanism. Restarting an infected Windows system evicts DoublePulsar from kernel memory, effectively removing it, though this does not address reinfection risks without patching the underlying vulnerability. Remote uninstallation is possible using the reversed sequence for the implant's self-removal function, integrated into detection scripts like those from WithSecure Labs (via the --uninstall flag over ) or Countercept, enabling cleanup without physical access but requiring network reachability and legal authorization for target systems. performs automated removal upon detection. For comprehensive remediation, combining removal with application of Microsoft's MS17-010 security update (released March 14, 2017) is recommended to block exploitation vectors used for initial implantation.

Controversies and Debates

Government Hoarding of Zero-Days

The National Security Agency (NSA) exploited a zero-day vulnerability in Microsoft's Server Message Block version 1 (SMBv1) protocol, designated CVE-2017-0144, to develop the EternalBlue exploit and the accompanying DoublePulsar backdoor implant, which allowed persistent remote code execution on targeted Windows systems. The agency discovered the flaw no later than 2013 and integrated it into its offensive toolkit for intelligence gathering and cyber operations against foreign adversaries, rather than promptly disclosing it to the vendor for remediation. Under the U.S. government's Vulnerabilities Equities Process (VEP), established in 2010 and formalized by 2017, agencies like the NSA assess discovered vulnerabilities to determine whether retention for purposes outweighs the benefits of disclosure to improve public cybersecurity. For and DoublePulsar, the NSA prioritized offensive utility, enabling implantation of tools or further payloads on unpatched systems worldwide, as the exploit's reliability—success rates exceeding 99% on vulnerable targets—justified hoarding despite internal concerns about potential leakage. This stockpiling practice extended to an arsenal of similar tools, with the NSA reportedly retaining vulnerabilities in to maintain cyber advantages, though officials later claimed disclosure of approximately 91% of found flaws through VEP reviews. The decision to hoard CVE-2017-0144, however, amplified risks when group leaked the NSA's tools—including and DoublePulsar source code—starting in August 2016 and culminating in a major dump on April 14, 2017, enabling non-state actors to weaponize them. Microsoft released a for the on March 14, 2017, following notification from the U.S. government after the initial teasers, but the delay in disclosure—spanning years—left millions of legacy systems exposed, contributing to the rapid propagation of like WannaCry on May 12, 2017. Cybersecurity experts and leadership attributed the attack's scale, which infected over 200,000 systems in 150 countries, partly to government hoarding, arguing it undermined collective defenses by prioritizing secretive operations over vendor notifications.

Intelligence Benefits vs. Public Risk

The DoublePulsar backdoor, developed by the U.S. Agency's , provided intelligence agencies with capabilities for persistent, low-detection access to compromised Windows systems, enabling remote code execution via reflective and shellcode deployment without writing to disk. This allowed targeted surveillance of high-value adversaries, such as foreign governments or terrorist networks, by facilitating , , and while minimizing forensic footprints that could alert targets. Proponents of such tools argue that stockpiling zero-day exploits like those powering DoublePulsar grants a strategic advantage in offensive cyber operations, preserving access to intelligence on evolving threats that disclosure to vendors would forfeit, as adversaries could rapidly patch and evade detection. Former NSA officials have contended that the U.S. government does not hoard "hundreds" of such vulnerabilities indiscriminately, emphasizing their role in over blanket release, which could undermine defensive postures against state-sponsored actors. Conversely, the public risks materialized acutely following the Shadow Brokers' leak of DoublePulsar on April 14, 2017, which decoupled the implant from its EternalBlue exploit vector and enabled widespread criminal repurposing. Within weeks, attackers deployed it in cryptojacking campaigns and, by May 12, 2017, integrated it into the WannaCry ransomware, infecting over 200,000 systems across 150 countries, paralyzing hospitals in the UK's National Health Service, factories like Renault's, and logistics firms, with estimated global damages exceeding $4 billion. Persistent exploitation continued, with DoublePulsar scans comprising 91.88% of SMB attacks on port 445 by 2022, underscoring how government-held exploits, once leaked, proliferate to non-state actors lacking the operational restraint of intelligence agencies. Critics, including civil liberties groups, assert that hoarding delays vendor patches—Microsoft issued an EternalBlue fix only post-leak for unsupported systems—exposing civilian infrastructure to indiscriminate harm, as evidenced by subsequent uses by Chinese, North Korean, and Russian hackers against private sectors. The debate over stockpiling centers on a causal : intelligence yields from tools like DoublePulsar, which evade commercial defenses for years, versus the inevitability of leaks amplifying public vulnerabilities in unpatched ecosystems. Ethical analyses frame zero-days as digital weapons, advocating international norms akin to to curb proliferation, though empirical evidence shows adversaries like repurposed leaked NSA tools by March 2016, predating public dumps. The U.S. Vulnerabilities Equities purportedly balances these by disclosing non-critical bugs, but post-Shadow Brokers scrutiny revealed opaque decision-making favoring offense, with advocacy sources often critiquing it through a lens skeptical of expansion, while cybersecurity analyses prioritize quantified risks like WannaCry's disruption over unmeasurable intel gains. Reasoned assessment suggests that while targeted benefits exist, the empirical pattern of reuse by opportunistic actors—coupled with patching delays—tilts risks toward broader populations reliant on shared software bases.

References

  1. [1]
    WannaCrypt ransomware worm targets out-of-date systems - Microsoft
    May 12, 2017 · ... backdoor known as DOUBLEPULSAR, but with certain adjustments to drop and execute the ransomware dropper payload, both for x86 and x64 systems.
  2. [2]
    DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis
    Apr 21, 2017 · DoublePulsar is the primary payload used in SMB and RDP exploits in FuzzBunch. Analysis was performed using the EternalBlue SMBv1/SMBv2 exploit against Windows ...
  3. [3]
    Buckeye: Espionage Outfit Used Equation Group Tools Prior to ...
    May 6, 2019 · Bemstour is specifically designed to deliver a variant of the DoublePulsar backdoor. DoublePulsar is then used to inject a secondary payload, ...
  4. [4]
    Over 36,000 Computers Infected with NSA's DoublePulsar Malware
    Apr 21, 2017 · DOUBLEPULSAR, one of the NSA hacking tools leaked last Friday by the Shadow Brokers, has been used in the wild by ordinary hackers, ...<|control11|><|separator|>
  5. [5]
    Ransomware WannaCry: All you need to know - Kaspersky
    However, EternalBlue was the exploit that allowed WannaCry to propagate and spread, with DoublePulsar being the 'backdoor' installed on the compromised ...
  6. [6]
    [PDF] Living off the land and fileless attack techniques
    A more recent example was the EternalBlue exploit used to deploy the DoublePulsar backdoor, both of which were used by · the WannaCry ransomware. Whenever the ...
  7. [7]
    Equation Group: The Crown Creator of Cyber-Espionage - Kaspersky
    Feb 16, 2015 · Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques.Missing: DoublePulsar attribution
  8. [8]
    NSA, the Shadow Brokers and Snowden: Inside the NSA hacking ...
    Apr 18, 2017 · The Shadow Brokers claims to have exposed the hacking tools used by the Equation Group, which is linked to the National Security Agency in ...
  9. [9]
    The Shadow Brokers Leaked Exploits Explained | Rapid7 Blog
    Apr 18, 2017 · A hacking group known as the “Shadow Brokers” released a trove of alleged NSA data, detailing exploits and vulnerabilities in a range of technologies.
  10. [10]
    Defense in depth: doublepulsar - Sumo Logic
    Jul 7, 2020 · With the recent Shadow Brokers data dump of the Equation Group tools, a precision SMB backdoor was included called Double Pulsar.Missing: reverse | Show results with:reverse
  11. [11]
    Stolen NSA hacking tools were used in the wild 14 months before ...
    May 6, 2019 · ... Shadow Brokers leak. An advanced persistent threat hacking group that Symantec has been tracking since 2010 somehow got access to a variant ...
  12. [12]
    Open-Source Command and Control of the DOUBLEPULSAR Implant
    Oct 2, 2019 · Metasploit's research team added a module to Framework that executes a Metasploit payload against the Equation Group's DOUBLEPULSAR implant ...
  13. [13]
    Shadowbroker releases alleged NSA EquationGroup Exploit Code ...
    Apr 20, 2017 · The Sonicwall Threats Research team is actively researching the exploit and malware code released on Good Friday, (4/14/2017), ...
  14. [14]
    What the Latest Shadow Brokers Dump Means for Your Business
    Apr 17, 2017 · The hacker group Shadow Brokers published on the internet a large cache of weaponized software exploits and hacking tools targeting numerous ...
  15. [15]
    Understanding DoublePulsar: Protecting Windows Boxes - Black Duck
    May 7, 2017 · A hacking tool leaked in April by a mysterious organization is attacking older Windows boxes, exposing gaps in organizational update and upgrade policies.
  16. [16]
    A quick analysis of the latest Shadow Brokers dump - LRQA
    Apr 17, 2017 · Just in time for Easter, the Shadow Brokers released the latest installment of an NSA data dump, which contained an almost overwhelming ...
  17. [17]
    Threat Advisory: Data leakage of multiple 0-days and tools - Mnemonic
    Apr 15, 2017 · 2017: Confirmed observations of ransomware distribution leveraging the leaked NSA exploits. Update 20.04.2017: Added CVE details to exploits ( ...
  18. [18]
    Trojan:Win32/DoublePulsar threat description - Microsoft
    Aug 3, 2018 · Microsoft Defender Antivirus detects and removes this threat. This threat can perform a number of actions of a malicious actor's choice on your device.Missing: analysis | Show results with:analysis
  19. [19]
    DoublePulsar – A Very Sophisticated Payload for Windows
    Jun 1, 2017 · One of these hacking tools is a backdoor implant codenamed DOUBLEPULSAR. It is a backdoor use to inject and run malicious code on an infection ...
  20. [20]
    From alert to driver vulnerability: Microsoft Defender ATP ...
    Mar 25, 2019 · As described in our in-depth analysis, DOUBLEPULSAR is a kernel backdoor used by the WannaCry ransomware to inject the main payload into user- ...
  21. [21]
    Microsoft Security Bulletin MS17-010 - Critical
    This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution.
  22. [22]
    EternalBlue Exploit: What It Is And How It Works? - SentinelOne
    May 27, 2019 · How does Eternalblue work? This NSA exploit is still causing problems across the web. Learn how to protect your Windows fleet from ...
  23. [23]
    WannaCry FAQ - Take-aways and Learnings - Fortinet
    May 17, 2017 · ... Shadow Brokers, and managed to infect thousands of Microsoft Windows computers in only a few weeks. Because DoublePulsar runs in kernel mode ...
  24. [24]
    What is WannaCry | Ransomware Attack Examples - Imperva
    Researchers discovered WannaCry is able to use DoublePulsar on machines that were previously infected with this dropper, allowing it to spread even more quickly ...
  25. [25]
    DoublePulsar malware spreading rapidly in the wild following ...
    Apr 25, 2017 · Then, using a detect script from Countercept, the company identified 56,586 hosts worldwide infected with the DoublePulsar implant, just over ...
  26. [26]
    Russian Cybercriminals Are Loving Those Leaked NSA Windows ...
    Apr 26, 2017 · Whilst Microsoft mysteriously patched its operating system to deflect attacks using the exploits a month before Shadow Brokers went public, the ...<|separator|>
  27. [27]
    NSA Malware 'Infects Nearly 200000 Systems' - Security - Silicon UK
    Apr 25, 2017 · The NSA's Doublepulsar attack tool infected nearly 80000 systems over the past weekend alone, according to worldwide scans.
  28. [28]
    Leaked NSA tools, now infecting over 200,000 machines, will be ...
    Apr 24, 2017 · More than 200,000 machines have been infected by an NSA backdoor leaked nearly two weeks ago by the Shadow Brokers hacking group, ...
  29. [29]
    Leaked NSA backdoor spreads throughout the world - iTnews
    Apr 24, 2017 · Exploit code infects tens of thousands of systems. Malicious code leaked by the Shadow Brokers that is believed to come from a hacking group ...
  30. [30]
    EternalPot — Lessons from building a global Nation State SMB ...
    May 28, 2017 · Aweek ago I started building #EternalPot, a honeypot for the Equation Group SMB exploits leaked by the Shadow Brokers last month.
  31. [31]
    "WannaCry" ransomware attack losses could reach $4 billion
    May 16, 2017 · Global financial and economic losses from the "WannaCry" attack that crippled computers in at least 150 countries could swell into the billions of dollars.
  32. [32]
    How Did NotPetya Cost Businesses Over $10 Billion In Damages?
    In June 2017, a cyberattack known as NotPetya unleashed unprecedented havoc across global networks, crippling infrastructure, halting business operations, ...
  33. [33]
    Indicators Associated With WannaCry Ransomware - CISA
    Jun 7, 2018 · This Alert has been updated to reflect the U.S. Government's public attribution of the "WannaCry" ransomware variant to the North Korean ...
  34. [34]
    THE NOTPETYA CYBER-ATTACK: RUSSIA-UKRAINE CONFLICT ...
    Jan 19, 2025 · This paper draws on realist theory to analyze the geopolitical implications of the NotPetya attack against Russia and Ukraine through power relations, state ...
  35. [35]
  36. [36]
    MS17-010: Security update for Windows SMB Server: March 14, 2017
    Mar 14, 2017 · Resolves a vulnerability in Windows that could allow remote code execution if an attacker sends specially crafted messages to a Microsoft ...Missing: DoublePulsar | Show results with:DoublePulsar<|separator|>
  37. [37]
    How to verify that MS17-010 is installed - Microsoft Support
    Security update MS17-010 addresses several vulnerabilities in Windows Server Message Block (SMB) v1. The WannaCrypt ransomware is exploiting one of the ...
  38. [38]
    KB4012598 - Microsoft Update Catalog
    ... Update for Windows Server 2003 (KB4012598), Windows Server 2003, Windows Server 2003, Datacenter Edition, Security Updates, 5/31/2017, n/a, 682 KB 698616.
  39. [39]
    How to Apply the Windows Update that Patches the EternalBlue ...
    Nov 25, 2024 · The first step in protecting any computer against WannaCry, Uiwix and other ransomware campaigns is to apply the critical patch that Microsoft released in ...
  40. [40]
    SMB EternalBlue and DoublePulsar Exploit - NHS England Digital
    Apr 25, 2017 · EternalBlue is an exploit designed to attack SMB (Server Message Block) file and print sharing services on the affected windows versions.Missing: analysis | Show results with:analysis
  41. [41]
    DOUBLEPULSAR Backdoor Detection | Nessus® and PVS - Tenable
    Apr 21, 2017 · DOUBLEPULSAR can be identified by both Nessus® and PVS™. Tenable customers can use Nessus plugin ID 99439 to actively scan their networks ...Missing: design analysis
  42. [42]
    Script for remote DoublePulsar backdoor removal available
    Apr 26, 2017 · DoublePulsar backdoor removal from any infected Windows machine can be effected remotely thanks to a script provided by security firm ...
  43. [43]
    WithSecureLabs/doublepulsar-detection-script - GitHub
    A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant. - WithSecureLabs/doublepulsar-detection-script.Missing: methods | Show results with:methods
  44. [44]
    Backdoor.DoublePulsar - Intrusion Prevention - FortiGuard Labs
    This indicates detection of DoublePulsar Backdoor. Backdoor trojans have the capability to connect remote hosts and perform actions against the compromised ...
  45. [45]
    The Leaked NSA Spy Tool That Hacked the World - WIRED
    Mar 7, 2018 · EternalBlue is the name of both a software vulnerability in Microsoft's Windows operating system and an exploit the National Security Agency developed to ...
  46. [46]
    NSA officials worried about the day its potent hacking tool would get ...
    May 16, 2017 · The National Security Agency began using a new hacking tool called EternalBlue, those entrusted with deploying it marveled at both its uncommon power and the ...
  47. [47]
    The NSA Is Hoarding Vulnerabilities - Schneier on Security
    Aug 26, 2016 · The agency is hoarding information about security vulnerabilities in the products you use, because it wants to use it to hack others' computers.
  48. [48]
    The U.S. Government and Zero-Day Vulnerabilities
    Nov 1, 2016 · The existence of two vulnerabilities is hardly evidence of hoarding. Even if this cache is only 2 percent of the NSA's total arsenal, then that ...Missing: EternalBlue DoublePulsar
  49. [49]
    Government not 'sitting on hundreds of zero days,' former NSA ...
    May 22, 2017 · We disclose something like 90 percent of the vulnerabilities we find,” said Richard Ledgett.Missing: DoublePulsar | Show results with:DoublePulsar
  50. [50]
    Microsoft Exec Blames WannaCry Ransomware on NSA ...
    May 14, 2017 · Microsoft Exec Blames WannaCry Ransomware on NSA Vulnerability Hoarding ... In a Reuters report, government officials admitted the hoarded zero- ...Missing: DoublePulsar | Show results with:DoublePulsar
  51. [51]
    WannaCry and Vulnerabilities - Schneier on Security
    Jun 2, 2017 · The particular vulnerability in WannaCry is code-named EternalBlue, and it was discovered by the US government—most likely the NSA—sometime ...
  52. [52]
    The challenge of offensive hacking: the NSA and zero days
    But don't confuse Snowden's actions with those of the Shadow Brokers. Snowden went public because he believed he was speaking out against government spying.
  53. [53]
    Doublepulsar backdoor spreading rapidly in the wild
    Apr 26, 2017 · On April 14, 2017 – The mysterious hacking group ShadowBrokers released cyber spying tools allegedly employed by the U.S. National Security ...
  54. [54]
    What Is EternalBlue and Why Is the MS17-010 Exploit Still Relevant?
    Jun 18, 2020 · EternalBlue is both the given name to a series of Microsoft software vulnerabilities and the exploit created by the NSA as a cyberattack tool.
  55. [55]
    Understanding the Effects of DoublePulsar & WannaCry
    May 15, 2017 · The Shadow Brokers, a hacking group known for releasing exploits and vulnerabilities allegedly used by the National Security Agency (NSA) ...
  56. [56]
    Majority of attacks against SMB protocol attempt to exploit EternalBlue
    May 11, 2022 · Barracuda researchers found that 91.88% of the attacks on port 445 (the most common SMB port) attempted to use the EternalBlue exploit.
  57. [57]
    US Government Malware Policy Puts Everyone At Risk | ACLU
    Jun 5, 2017 · The malicious software, known as “WannaCry,” encrypted files on users' machines, effectively locking them out of their information, and demanded a payment to ...
  58. [58]
    The Strange Journey of an NSA Zero-Day—Into Multiple Enemies ...
    May 7, 2019 · ... exploit and the NSA's DoublePulsar backdoor. Those intrusions, all seemingly bent on espionage, hit telecommunications companies as well as ...
  59. [59]
    The Shadow Brokers Mess Is What Happens When the NSA Hoards ...
    Aug 17, 2016 · A case of data apparently stolen from an NSA hacking team seems to show the risks that result when the agency chooses offense over defense.
  60. [60]
    The Ethics of Stockpiling Zero-Day Vulnerabilities
    May 4, 2022 · The use of zero-days has propelled this exploration and empowered governments to remotely attack the software systems of their adversaries.
  61. [61]
    Chinese hackers found and repurposed elite NSA-linked tools
    May 6, 2019 · DoublePulsar was used in conjunction with another tool, which Symantec calls Trojan.Bemstour, that took advantage of various Microsoft Windows ...