Shadow Broker exploit dumps five million cyber attacks

Kaspersky: Hacking tool leaks fuel cyber criminal activity

shadowy hands over a keyboard

More than five million cyber attacks originated from a series of exploit archives dumped onto the internet between April and June this year, according to Kaspersky Lab.

Its software blocked more than five million attacks based on hacking group Shadow Brokers' exploit dumps, but the rate of attacks using these tools is growing; more than 80% were detected during the last 30 days of the quarter.

"The threat landscape of Q2 provides yet another reminder that a lack of vigilance is one of the most significant cyber dangers," said Kaspersky Lab security expert Alexander Liskin.

"While vendors patch vulnerabilities on a regular basis, many users don't pay attention to this, which results in massive-scale attacks once the vulnerabilities are exposed to the broad cyber criminal community."

Shadow Brokers has already had a huge impact of the security landscape. The mysterious group began releasing huge troves of offensive malware and cyber weapons last year, many of which were allegedly created and used by US intelligence agencies such as the NSA.

The latest dump, which occurred in April this year, included a number of highly sophisticated tools. It was considered by many experts to be one of the most dangerous and damaging leaks in cyber security history.

Alongside codenamed exploits including DarkPulsar, OddJob and FuzzBunch, the dump included the EternalBlue exploit targeting elements of the Windows OS. This malware in particular was an instrumental part of the WannaCry ransomware that nearly crippled organisations including the NHS, before it was stopped by security researcher Marcus Hutchins.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021
Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021