{"id":224830,"date":"2017-07-01T09:07:01","date_gmt":"2017-07-01T13:07:01","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/notpetya-developers-may-have-obtained-nsa-exploits-weeks-before-their-public-leak-updated-ars-technica.php"},"modified":"2017-07-01T09:07:01","modified_gmt":"2017-07-01T13:07:01","slug":"notpetya-developers-may-have-obtained-nsa-exploits-weeks-before-their-public-leak-updated-ars-technica","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/notpetya-developers-may-have-obtained-nsa-exploits-weeks-before-their-public-leak-updated-ars-technica.php","title":{"rendered":"NotPetya developers may have obtained NSA exploits weeks before their public leak [Updated] &#8211; Ars Technica"},"content":{"rendered":"<p><p>Enlarge \/ A computer screen    displaying Eternalromance, one of the NSA exploits used in    Tuesday's NotPetya outbreak.      <\/p>\n<p>    Update:This post was revised throughout to reflect    changes F-Secure made to Thursday's blog post. The company now    says that the NotPetya component was probably completed in    February, and assuming that timeline is correct, it didn't have    any definitive bearing on when the NSA exploits were obtained.    F-Secure Security Advisor Sean Sullivan tells Ars that the    component weaves in the NSA exploits so well that it's likely    the developers had access to the NSA code. \"It strongly hints    at this possibility,\" he said. \"We feel strongly that this is    the best theory to debunk.\" This post has been revised to make    clear that the early access is currently an unproven theory.  <\/p>\n<p>    Original Story:The people behind    Tuesday's massive malware outbreak might have had access to two    National Security Agency-developed exploits several weeks    before they were published on the Internet, according to clues    researchers from antivirus F-Secure found in some of its code.  <\/p>\n<p>    On Thursday, F-Secure researchers said that unconfirmed    timestamps left in some of the NotPetya malware code suggested    that the developers may have had access to EternalBlue and    EternalRomance as early as February, when they finished work on    the malware component that interacted with the stolen NSA    exploits. The potential timeline is all the more significant    considering the quality of the component, which proved    surprisingly adept in spreading the malware from computer to    computer inside infected networks. The elegance lay in the way    the component combined the NSA exploits with three    off-the-shelf tools including     Mimikatz,     PSExec, and     WMIC. The result: NotPetya could infect both patched and    unpatched computers quickly. Code that complex and effective    likely required weeks of development and testing prior to    completion.  <\/p>\n<p>    \"February is many weeks before the exploits EternalBlue and    EternalRomance (both of which this module utilizes) were    released to the public (in April) by the Shadow Brokers,\"    F-Secure researcher Andy Patel     wrote in a blog post. \"And those exploits fit this    component like a glove.\"  <\/p>\n<p>    Whereas the two other main components of NotPetyaan encryption    component and a component for attacking a computer's master    boot recordwere \"pretty shoddy and seem kinda cobbled    together,\" Patel said the spreading component seems \"very    sophisticated and well-tested.\" It remains possible that the    February timestamps found in some of the code was falsified.    Assuming the stampsare correct, they suggest that    developers may have had access, or at least knowledge of, the    NSA exploits by then. By contrast, Patel added:  <\/p>\n<p>      WannaCry clearly picked [the NSA] exploits up after the      Shadow Brokers dumped them into the public domain in April.      Also WannaCry didn't do the best job at implementing these      exploits correctly.    <\/p>\n<p>      By comparison, this \"Petya\" looks well-implemented, and seems      to have seen plenty of testing. It's fully-baked.    <\/p>\n<p>    The weeks leading up to the possible February completion of the    NotPetya spreader was a particularly critical time for computer    security. A month earlier, the Shadow Brokers advertised an    auction that revealed some of the names of the exploits they    had, including EternalBlue. NSA officials responded by     warning Microsoft of the theft so that the company could    patch the underlying vulnerabilities. In February, Microsoft        abruptly canceled that month's Patch Tuesday. The    unprecedented move was all the more odd because     exploit code for an unpatched Windows 10 flaw was already in    the wild, and Microsoft gave no explanation for the    cancellation.  <\/p>\n<p>    \"Meanwhile, 'friends of the Shadow Brokers' were busy finishing    up development of a rather nifty network propagation component,    utilizing these exploits,\" Patel wrote.  <\/p>\n<p>    When Patch Tuesday resumed in March, Microsoft released a    critical security update that fixed EternalBlue. As the WCry    outbreak would later demonstrate, large numbers of    computersmainly    running Windows 7failed to install the updates, allowing    the worm to spread widely.  <\/p>\n<p>    If the timeline is correct, it might mean the NotPetya    developers had some sort of tie to the Shadow Brokers, possibly    as customers, colleagues, acquaintances, or friends. It might    also make NotPetya the first piece of in-the-wild malware that    had known early access to the NSA exploits. Patel didn't    speculate how the NotPetya developers might have gotten hold of    EternalBlue and EternalRomance prior to their public release in    April.  <\/p>\n<p>    Early speculation was that Shadow Brokers members acquired a    small number of hacking tools that NSA personnel stored on one    or more staging servers used to carry out operations. The    volume and sensitivity of the exploits and documents released    over the next several months slowly painted a much grimmer    picture. It's now clear that the group has capitalized on what    is likely the worst breach in NSA history. There's no    indication that the agency has identified how it lost control    of such a large collection of advanced tools or that it knows    much at all about the Shadow Brokers' membership. The group,    meanwhile, continues to publish blog posts written in    deliberately broken English, with the     most recent one appearing on Wednesday.  <\/p>\n<p>    The F-Secure theory adds a new, unsettling entry tothe    Shadow Brokers' resume. The world already knew the group    presided over a breach of unprecedented scope and leaked    exploits to the world. Now, we know it also provided crucial    private assistance in developing one of the most virulent worms    in recent memory.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/arstechnica.com\/security\/2017\/06\/notpetya-developers-obtained-nsa-exploits-weeks-before-their-public-leak\/\" title=\"NotPetya developers may have obtained NSA exploits weeks before their public leak [Updated] - Ars Technica\">NotPetya developers may have obtained NSA exploits weeks before their public leak [Updated] - Ars Technica<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Enlarge \/ A computer screen displaying Eternalromance, one of the NSA exploits used in Tuesday's NotPetya outbreak.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/notpetya-developers-may-have-obtained-nsa-exploits-weeks-before-their-public-leak-updated-ars-technica.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-224830","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/224830"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=224830"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/224830\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=224830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=224830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=224830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}