TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Thousands of computers now compromised with leaked NSA tools, researchers say

374 pointsby remxabout 8 years ago

20 comments

arca_voragoabout 8 years ago
Which is exactly what we <i>crazy cookoo conspiracy theorists</i> have been warning about. It&#x27;s the same slipperly slope we already went through in the 90&#x27;s crypto wars, but SV gets amnesia when it gets lots of stupid company valuations and forgets all those lessons apparently.<p>Bottom line is this. If you put backdoors in, or exploit 0days for your own, they will get out in the wild eventually, and suddenly you have massively <i>weakened</i> infrastructure, corporate, and government security... basically all the things important to national security in general. So while I don&#x27;t disagree that triple letters need some cool tools to get shit done, I think this function needs some technocratic oversight specifically for this issue.<p>It&#x27;s time for a new Church committee.
评论 #14180579 未加载
评论 #14179114 未加载
评论 #14179975 未加载
评论 #14179256 未加载
评论 #14180933 未加载
评论 #14180038 未加载
评论 #14183544 未加载
评论 #14180889 未加载
评论 #14181658 未加载
评论 #14180784 未加载
eternalvisionabout 8 years ago
Tech security has been an afterthought for too long. The core technologies we use are putting us at grave risk in ways we simply cannot imagine. As we now are starting to realize, that all of our digital lives are permanently centrally recorded carries currently unimaginable risks down the road. That we have centralized global social networks carries risks that the majority of people are not able to experience or understand. We&#x27;re progressing too fast technologically, and there&#x27;s way too much of a gap between morphing cultural norms and a system of government that will be, by default, always out of date with respect to these evolving norms.<p>That we connect directly to a worldwide network with minimum consideration for security is very troubling. In decades to come, we&#x27;ll look back in humility and realize that the manners in which we used technology added grave risks to our health.<p>In 2017, we are not in the &quot;wild wild west&quot; age of technology. Rather, we are firmly in the dark ages. We&#x27;re so far away from having an understanding regarding the lack of social maturity in our technological growth that we fail to properly consider the downside risks.<p>This is a tough nut to crack because technology is simply <i>too good</i> for the majority, even the technically inclined majority. I recall efforts by very very talented folks to build decentralized technologies to help mitigate some of these long term risks, but such efforts will remain firmly at the fringes of intellectual superiority for a long time. Meanwhile, Goliath will simply grow stronger in time, unless there is some major cultural shift. Is there any such shift happening, beyond the fringe?
评论 #14179715 未加载
ChuckMcMabout 8 years ago
It would be interesting (although I expect impossible) to figure out how many of those thousands were compromised by the NSA vs those compromised by people who got the tools through the leak. It was nice that Microsoft had already fixed a bunch of them (almost like they were told ahead of time they were coming).<p>It is also interesting to read the outrage about the tools and the presentations on how to use them. If you have ever read the user&#x27;s manual for a cluster bomb which no doubt tells you in detail how to maximize the number of people it will kill, you get a sense of how destructive and outrageous war can be. Why should cyber war be any different? And how is it any different to use a zero day to compromise a system than it is to use an architectural feature of a building to bring it down on top of its occupants (other than the obvious loss of life). Exploiting defects in the deployed system to maximize the effectiveness of a munition, not a new thing at all. Just the reality of warfare.<p>We&#x27;re pretty clearly already in a form of warfare and it is having visible effects on things like infrastructure and elections. So how do we make the battles visible to the common folks? How do convince Mom &amp; Dad to patch their router so that they don&#x27;t inadvertently aid the &#x27;badguys&#x27; in their quest for dominance on the digital battlefield?<p>Definitely feels like Phase III of the Internet has begun to me.
评论 #14182169 未加载
评论 #14181670 未加载
评论 #14189946 未加载
评论 #14180481 未加载
mirimirabout 8 years ago
&gt; “Shodan has currently indexed more than 2 million IPs running a public SMB service on port 445. ...&quot;<p>OK, I understand SMB on LAN. But SMB on the Internet? Is that likely accidental?
评论 #14182172 未加载
1001101about 8 years ago
I have heard the NSA mission in this regard characterized as both defensive, and offensive. Defensive in that they protect our infrastructure (a counter-intel role), and offensive in that they attempt to exploit the infrastructure of our adversaries (and others) for sigint. They trick is finding the right balance, and I don&#x27;t think there&#x27;s much hope for agreement on that at the moment. I also find the debate a difficult one to engage in because there are large information asymmetries and much of what we&#x27;re trying to discuss is obscured by secret courts, classified documents, etc. My impression is that even the people who are tasked with oversight don&#x27;t get the full picture, so what do we hope to know about it. I&#x27;ve had experiences in industry that I can&#x27;t talk about that maybe you (in the general sense) haven&#x27;t had that also inform my views.<p>Personally, my view is that we should be putting the focus on the defensive side. Protect infrastructure, IP, etc. I believe the reputation of technology in general is harmed by the offensive mission, and US companies disproportionately so. There is now even greater incentives for our adversaries (and friends) to foster development of technologies that compete directly with US products in their own jurisdictions (where they can get a look under the hood).
lend000about 8 years ago
I like the idea of the agencies being allowed to use a zero-day with some asterisks.<i></i><p>* The zero-day has to be powerful enough to allow the agency to gain full access &amp; remotely patch the zero day -- i.e. if the zero-day gets out, and the agency didn&#x27;t warn the manufacturer ahead of time and instead used it for its own purposes, it <i>must</i> have the capability to &quot;immediately&quot; scan the internet for the vulnerability and patch it where accessible.<p>* If the above condition is not satisfied, or if the agency can&#x27;t&#x2F;won&#x27;t dedicate the resources to develop a backup patch, it should be required to alert the manufacturer immediately.<p>Does this cost more? Yes. Does it limit some of the monitoring capabilities they will have? Yes. The second seems like a pro. The first one seems like a worthy compromise for questionable activity with high potential for collateral damage.
评论 #14185392 未加载
c0achmcguirkabout 8 years ago
&quot;Once installed, DOUBLEPULSAR is a stealthy backdoor that’s difficult to detect and continuously relays new information back to its controller.&quot;<p>Seems to contradict itself? If it&#x27;s continuously relaying information, wouldn&#x27;t that make it easy to detect?
评论 #14180053 未加载
评论 #14179737 未加载
LoSboccaccabout 8 years ago
shower thought: have them been infected now, or now are known to be infected?
评论 #14179373 未加载
davidf18about 8 years ago
I am worried about the firmware of Intel processors which I believe have had firmware since the mid-1990s or a bit later. Is this possible and are there tools &quot;in the wild&quot; that are capable of doing this? Does Intel do some sort of checksum to ensure that this cannot happen?
评论 #14189982 未加载
balganabout 8 years ago
For more details on this and regular updated on the infection numbers check:<a href="https:&#x2F;&#x2F;blog.binaryedge.io&#x2F;2017&#x2F;04&#x2F;21&#x2F;doublepulsar&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.binaryedge.io&#x2F;2017&#x2F;04&#x2F;21&#x2F;doublepulsar&#x2F;</a>
Pica_soOabout 8 years ago
The zero-day NSA Pensionfund congratulates John &amp; Jane Doe to his retirement and wishes him&#x2F;her a nice golden autumn in his Florida beach villa.
squozzerabout 8 years ago
&quot;The sheer number of computers infected with DOUBLEPULSAR is likely the work of amateurish hackers, experts said.&quot;<p>A huge assumption.
rapjsabout 8 years ago
Thanks Apple, for not caving to public pressure.
awarerabout 8 years ago
Side topic: How can the free market&#x2F;enterprise work properly if there are backdoors and zero days all over the place?
评论 #14179602 未加载
评论 #14180044 未加载
awqrreabout 8 years ago
At the very least, they should at least create some honeypots to know when those exploits are being used by others...
thomastjefferyabout 8 years ago
Just thousands? I think that is a few orders of magnitude shy...
godmodusabout 8 years ago
Good, the will jolt national and global security standards.
wslhabout 8 years ago
Are the added to a popular antivirus list?
评论 #14179067 未加载
sebowabout 8 years ago
shocking news indeed, seems like you need researchers and studies about everything nowadays, otherwise you&#x27;re called names
nojaabout 8 years ago
&quot;now&quot;