• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

TechEngage®

Connecting mankind with technology

  • News
  • Reviews
  • Cryptocurrency
  • How-to
  • Roundups
  • Science
    • Energy
    • Environment
    • Health
    • Space
  • Apps
  • More
    • Opinion
    • Noteworthy
    • Culture
    • Events
    • Deals
    • Startups
      • Startup Submissions
  • Videos
  • Tools
TechEngage » News » Security

Hackers are using leaked NSA tools to hijack computers

Muhammad Abdullah Follow Muhammad Abdullah on Twitter Updated: January 11, 2020

Anonymous mask hacking illustration with 1 0 bits in background
illustration by Muntaha / TechEngage
FacebookTweetPinLinkedInPrintEmail

Remember National Security Agency’s (NSA) most potent and capable hacking tools were leaked on the internet a year ago? Well, hackers are still using these tools to hijack unpatched computers that are vulnerable to hacks. The worst part is, these unpatched systems are vulnerable to hacks that can be used to take over their devices entirely. This makes these attacks all the more dangerous.

According to the security research company Akamai, hackers are using the UPnProxy vulnerability to target hundreds of thousands of unpatched computers behind the router’s firewall. Researchers warn that these tools can be used to create a bigger malicious proxy network that can cause harm on a larger scale.

Earlier, attackers were using UPnProxy which affects Universal Plug and Play network protocol to remap the Several computers in UK National Health Service and in Russia that were targeted two years ago using these tools. These attacks affected dozens of countries including India, Ukraine, and Taiwan. According to Akamai, apart from 3.5 million devices that were vulnerable to attacks, numbers of vulnerable systems got limited to 277,000. However, more than 45,000 of these computers are already infected. These numbers can change depending on the amount of computers attackers continue to scan to compromise new devices. Shadow Brokers published the EternalBlue exploit in April was later patched by Microsoft. Whereas EternalRed exploit affected Linux devices.

Another crypto mining attack was caused by these stolen NSA hacking tools that were published online. Hackers started using these exploits to attack the vulnerable computers to run ransomware on businesses, hospitals, and thousands of computers. These attacks were spread like fire, WannaCry and NotPetya attacks were some of them. It didn’t stop there, the attack affected all the computers on the network. The recovery was slow, and cost reached millions in damages.

To handle the situation on Windows computers, Microsoft released patches to close the backdoor that allowed these attacks. But almost one million computers and networks are still vulnerable to these attacks. Although these WannaCry attacks are no more active, attackers are still using exploits from NSA to infect computers with cryptomining malwares like WannaMine.

It is no surprise that NSA’s hacking tools are causing havoc in the world. The agency is involved in developing several hacking tools to sneak on different devices all over the world.

The latest implementation is being called Eternal Silence by Akamai researchers. The company suggests to use routers without UPnP or make sure that the protocol is disabled on their router. For the long-term solution, consider investing in the new routers.

This post was originally published on November 29, 2018 and was updated on January 11, 2020.

Filed Under: Security, Cryptocurrency Tagged With: Cryptojacking, Cryptomining, NSA

Related Stories

  • Marriott breach now involves passport numbers

    Marriott breach now involves passport numbers

  • Your home can be smart or secure, but probably not both

    Your home can be smart or secure, but probably not both

  • Enhancing cybersecurity for remote working

    Enhancing cybersecurity for remote working

FacebookTweetPinLinkedInPrintEmail

About Muhammad Abdullah

Abdullah is a computer scientist turned tech writer and certified Growth Hacker.

Reader Interactions

Share Your Thoughts Cancel reply

Please read our comment policy before submitting your comment. Your email address will not be used or published anywhere. You will only receive comment notifications if you opt to subscribe below.

Primary Sidebar

Become a contributor

We are accepting contributor applications. All applications will be decided in 3 days after applying. To learn more visit the contributors page.
TextSheet Alternative

6 Top Alternatives to Textsheet for 2025

Muhammad Zeshan Sarwar October 5, 2024

battery draining apps

Top 10 battery draining apps to avoid 2025

Muhammad Abdullah October 5, 2024

Recent Stories

  • 6 Top Alternatives to Textsheet for 2025
  • Top 10 battery draining apps to avoid 2025
  • The Benefits of Having a Small Air Compressor for Flat Tires
  • 4 Best Free VPNs for 2025
  • 9 Best Calendar Apps in 2025

Footer

Discover

  • About us
  • Newsroom
  • Staff
  • Advertise
  • Send us a tip
  • Startup Submission Questionnaire
  • Brand Kit
  • Contact us

Legal pages

  • Reviews Guarantee
  • Community Guidelines
  • Corrections Policy and Practice
  • Cookies Policy
  • Our Ethics
  • Disclaimer
  • GDPR Compliance
  • Privacy Policy
  • Terms and Conditions

Must reads

  • Best AirPods alternatives on Amazon
  • Best PC monitors for gaming on Amazon
  • Best family board games
  • Best video doorbells without subscription
  • Best handheld video game consoles
  • Best all-season tires for snow
  • Best mobile Wi-Fi hotspots
  • Best treadmills on Amazon

Download our apps

TechEngage app coming soon on App Store

© 2024 TechEngage®. All Rights Reserved. TechEngage® is a project of TechAbout LLC.

TechEngage® is a registered trademark in the United States under Trademark Number 6823709 and in the United Kingdom under Trademark Number UK00003417167. It is also ISSN protected under ISSN 2690-3776 and has OCLC Number 1139335774.

  • Terms & Conditions
  • Privacy Policy