Skip to main content

NSA tools are still letting hackers take over unpatched systems

Casezy/Getty Images

It’s been more than a year since some of the NSA’s most capable hacking tools were stolen and leaked online, and despite a concerted effort to see PCs and systems patched against them, many thousands are still vulnerable to the attacks, which continue to work. Worse still, new and more advanced attack methods are being used to make these tools even more effective, leading to hackers taking over systems in their entirety.

The NSA has long been known to be involved in developing clever hacking tools that can snoop on all sorts of networked hardware all over the world. The Edward Snowden revelations provided just a small insight into their capabilities and just over a year ago, when some of the agency’s hacking tools leaked online, we learned even more. But that leak was far worse in many ways, as it meant that hackers could take advantage of those hacking tools, and they still are, to great effect.

Recommended Videos

The UPnProxy attack was first spotted earlier this year, with cloud service provider Akamai Technologies highlighting how more than 3.5 million devices around the world were potentially vulnerable to the hack, which used port-forwarding on a router to send malicious traffic to a connected system. Months later, that number of vulnerable systems has been limited to just 277,000, but that’s still a huge pool for hackers to draw from, and Akamai is now reporting that some 45,000 of those have already been compromised.

As TechCrunch reports, hackers are now using a pair of exploits developed by the NSA to burrow through the router and attack connected systems. The two exploits, known as EternalBlue and EternalRed, target Windows and Linux-based systems respectively. This new attack is being termed “EternalSilence” by Akamai, which warns that with 45,000 infected devices, more than a million connected computers could also be vulnerable.

Suggestions on how to protect yourself and your system from the attack include patching to the latest version of your operating system — Microsoft has patched most of the vulnerabilities these tools exploit — and updating your router firmware. If there is any suggestion that your network may have been compromised though, Akamai suggests that replacing the potentially infected router entirely may be the best course of action.

Concerned about PC security? Check out our regular [in]secure column to learn more.

Jon Martindale
Jon Martindale is a freelance evergreen writer and occasional section coordinator, covering how to guides, best-of lists, and…
Hacking-as-a-service lets hackers steal your data for just $10
A depiction of a hacker breaking into a system via the use of code.

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage and perform their cyber crimes has been discovered -- and it’s gaining traction.

As reported by Bleeping Computer, security researchers unearthed a program called Dark Utilities, effectively providing a command and control (C2) center.

Read more
Oh great, new malware lets hackers hijack your Wi-Fi router
The Linksys Hydra 6 dual-band mesh WiFi 6 router.

As if you didn't already have enough to worry about, a new report finds hackers are targeting home Wi-Fi routers to gain access to all your connected devices.

The report comes from Black Lotus Lab, a security division of Lumen Technologies. The report details several observed real-world attacks on small home/home office (SOHO) routers since 2020 when millions of people began working from home at the start of the COVID 19 pandemic.

Read more
Hackers can now take over your computer through Microsoft Word
A dark mystery hand typing on a laptop computer at night.

A new zero-day vulnerability in Microsoft Office could potentially allow hackers to take control of your computer. The vulnerability can be exploited even if you don't actually open an infected file.

Although we're still waiting for an official fix, Microsoft has released a workaround for this exploit, so if you frequently use MS Office, be sure to check it out.

Read more