❝ UPDATE: Microsoft has patched the majority of the exploits released by The Shadow Brokers. More details can be found here, and the company recommends updating to a supported version of Windows and downloading security fixes.
The original story follows below:
❝ On Friday, the group known as The Shadow Brokers dropped the hacking equivalent of a bomb, or perhaps several bombs, giving hackers all over the world the tools to easily break into millions of Windows computers…
This is bad news not just for the NSA, but for the internet as a whole, according to security researchers who are poring through the dump. As someone called it, this is “cyber chaos.”
❝ Perhaps the worst tool released by the hackers is called “FUZZBUNCH.” This is a hacking suite or toolkit that contains several plug-and-play exploits to attack several versions of Windows operating system. Some researchers described it as something akin to Metasploit, a popular open source hacking framework…
In fact, the latest Shadow Brokers dump contains several working Windows zero-days in executable (.exe) binaries with “step-by-step logs laying out how they’re used and the commands to run”…
That means that pretty much anyone, from low-level cybercriminals to so-called “script kiddies” — hackers who are only good at reusing other hackers’ tools — could repurpose them to attack Windows computers…
❝ In the meantime, you can either shut down your Windows machine or block incoming connections to port 445 and 139 with the firewall to prevent some of the attacks, according to security researchers.
❝ The leaked tools are dated around 2013, so they don’t affect modern Windows operating systems such as Windows 10. But according to Hacker Fantastic, the FUZZBUNCH framework supports all kinds of Windows systems: server versions from NT, 2000, 2003, 2008 and up to 2012, as well as the consumer versions XP, Vista, 7 and Windows 8.
I worked within the Microsoft/IBM framework for 22 years before moving to Apple’s OSX [and following mobile OS’] over a decade ago. Yeah, anything can be hacked; but, ain’t much need to make it easy.