Английская Википедия:DoublePulsar

Материал из Онлайн справочника
Перейти к навигацииПерейти к поиску

Шаблон:Short description Шаблон:For

Шаблон:Infobox computer virus

DoublePulsar is a backdoor implant tool developed by the U.S. National Security Agency's (NSA) Equation Group that was leaked by The Shadow Brokers in early 2017.[1]Шаблон:Citation needed The tool infected more than 200,000 Microsoft Windows computers in only a few weeks,[2][3][1][4][5] and was used alongside EternalBlue in the May 2017 WannaCry ransomware attack.[6][7][8] A variant of DoublePulsar was first seen in the wild in March 2016, as discovered by Symantec.[9]

Sean Dillon, senior analyst of security company RiskSense Inc., first dissected and inspected DoublePulsar.[10][11] He said that the NSA exploits are "10 times worse" than the Heartbleed security bug, and use DoublePulsar as the primary payload. DoublePulsar runs in kernel mode, which grants cybercriminals a high level of control over the computer system.[3] Once installed, it uses three commands: ping, kill, and exec, the latter of which can be used to load malware onto the system.[10]

References

Шаблон:Reflist

Шаблон:Hacking in the 2010s

Шаблон:Malware-stub