Arab Times

Microsoft fixes NSA ‘malware’

-

PARIS, April 15, (Agencies): Up-to-date Microsoft customers are safe from the purported National Security Agency spying tools dumped online, the software company said Saturday, tamping down fears that the digital arsenal was poised to wreak havoc across the internet .

In a blog post, Microsoft Corp security manager Phillip Misner said that the software giant had already built defenses against nine of the 12 tools disclosed by The Shadow Brokers, a mysterious group that has repeatedly published NSA code. The three others affected old, unsupporte­d products.

“Most of the exploits are already patched,” Misner said.

The post tamped down fears expressed by some researcher­s that the digital espionage toolkit made public by The Shadow Brokers took advantage of undisclose­d vulnerabil­ities in Microsoft’s code. That would have been a potentiall­y damaging developmen­t because such tools could swiftly be repurposed to strike across the company’s massive customer base.

Those fears appear to have been prompted by experts using even slightly out-of-date versions of Windows in their labs. One of Microso ft’s fixes, also called a patch, was only released last month .

“I missed the patch,” said British security architect Kevin Beaumont, jokingly adding, “I’m thinking about going to live in the woods now.”

Beaumont wasn’t alone.

Matthew Hickey, of cybersecur­ity firm Hacker House, also ran the code against earlier versions of Windows on Friday. But he noted that many organizati­ons put patches off, meaning “many servers will still be affected by these flaws.”

Everyone involved recommende­d keeping up with software updates.

“We encourage customers to ensure their computers are up-to-date,” Misner said.

A new set of documents purportedl­y lifted from the US National Security Agency suggests that American spies have burrowed deep into the Middle East’s financial network, apparently compromisi­ng the Dubai office of the anti-money laundering and financial services firm EastNets. The company said Friday the documents were dated and denied that any customer data had been affected.

TheShadowB­rokers, which startled the security experts last year by releasing some of the NSA’s hacking tools, has recently resumed pouring secrets into the public domain. In a first for TheShadowB­rokers, the data include PowerPoint slides and purported target lists, suggesting the group has access to a broader range of informatio­n than previously known.

“This is by far the most brutal dump,” said Comae Technologi­es founder Matt Suiche, who has closely followed the group’s disclosure­s and initially helped confirm its connection to the NSA last year. In a blog post , he said it appeared that thousands of employee accounts and machines from EastNets’ offices had been compromise­d and that financial institutio­ns in Kuwait, Bahrain and the Palestinia­n territorie­s had been targeted for espionage.

In a statement , EastNets said there was “no credibilit­y” to the allegation that its customers’ details had been stolen.

The company, which acts as a “service bureau” connecting customers to the financial world’s electronic backbone, SWIFT, said the ShadowBrok­ers documents referred to a “low-level internal server” that had since been retired and that a “complete check” of its systems had turned up no evidence of any compromise.

The denial drew skepticism from those who’d reviewed the files.

“Eastnets’ claim is impossible to believe,” said Kevin Beaumont, who was one of several experts who spent Friday combing through the documents and trying out the code. He said he’d found password dumps, an Excel spreadshee­t outlining the internal architectu­re of the company’s server and one file that was “just a massive log of hacking on their organizati­on.”

SWIFT, based in Belgium, released a less categorica­l statement, saying, “we understand that communicat­ions between these service bureaus and their customers may previously have been accessed by unauthoriz­ed third parties.” It said there was no evidence its own network had been compromise­d.

Repeated messages seeking clarificat­ion from EastNets went unreturned.

Beaumont said there was bad news in the release for Microsoft as well. He said the malicious code published Friday appeared to exploit previously undiscover­ed weaknesses in older versions of its Windows operating system — the mark of a sophistica­ted actor and a potential worry for many of Windows’ hundreds of millions of users.

The opinion was seconded by Matthew Hickey of Prestbury, Englandbas­ed cybersecur­ity company Hacker House.

“It’s an absolute disaster,” Hickey

Newspapers in English

Newspapers from Kuwait