Shadow Broker exploit dumps five million cyber attacks

Kaspersky: Hacking tool leaks fuel cyber criminal activity

shadowy hands over a keyboard

More than five million cyber attacks originated from a series of exploit archives dumped onto the internet between April and June this year, according to Kaspersky Lab.

Its software blocked more than five million attacks based on hacking group Shadow Brokers' exploit dumps, but the rate of attacks using these tools is growing; more than 80% were detected during the last 30 days of the quarter.

Advertisement - Article continues below

"The threat landscape of Q2 provides yet another reminder that a lack of vigilance is one of the most significant cyber dangers," said Kaspersky Lab security expert Alexander Liskin.

"While vendors patch vulnerabilities on a regular basis, many users don't pay attention to this, which results in massive-scale attacks once the vulnerabilities are exposed to the broad cyber criminal community."

Shadow Brokers has already had a huge impact of the security landscape. The mysterious group began releasing huge troves of offensive malware and cyber weapons last year, many of which were allegedly created and used by US intelligence agencies such as the NSA.

The latest dump, which occurred in April this year, included a number of highly sophisticated tools. It was considered by many experts to be one of the most dangerous and damaging leaks in cyber security history.

Alongside codenamed exploits including DarkPulsar, OddJob and FuzzBunch, the dump included the EternalBlue exploit targeting elements of the Windows OS. This malware in particular was an instrumental part of the WannaCry ransomware that nearly crippled organisations including the NHS, before it was stopped by security researcher Marcus Hutchins.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/cyber-security/354540/nsa-hands-serious-flaw-to-microsoft-rather-than-use-it
cyber security

NSA hands serious flaw to Microsoft rather than use it

15 Jan 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/cloud/355098/ibm-dedicates-supercomputing-power-to-coronavirus-researchers
high-performance computing (HPC)

IBM dedicates supercomputing power to coronavirus research

24 Mar 2020