D
Deleted member 178
Thread author
The ShadowBrokers, an entity previously confirmed by The Intercept to have leaked authentic malware used by the NSA to attack computers around the world, today released another cache of what appears to be extremely potent (and previously unknown) software capable of breaking into systems running Windows. The software could give nearly anyone with sufficient technical knowledge the ability to wreak havoc on millions of Microsoft users.
Then :
A group calling themselves "ShadowBrokers" has been leaking files it claims to have found when it hacked into NSA computers. Many of the leaks are concerning, but the latest exploits for Windows have many folks wondering how it affects them and their computers. We're not going to get too technical or dive into any details on how the hacks work, but we can help you understand what you need to know to protect yourself.
We tested the leaked files on virtual machines running Windows XP, Windows 7, Windows Server 2012 R2 and Windows 8 Pro to see if they're vulnerable. We also tested a local installation of Windows 10 Pro 64-bit. This is a quick list of what we found:
- Windows 10 seems to be immune to the exploits leaked on April 14, 2017.
- There are exploits that work 100 percent against Windows 7 with the April Service Pack.
- There are exploits that work 100 percent against Windows Server 2012 R2 with the latest updates as of April 14, 2017.
- There are exploits that work 100 percent against Windows XP with the latest updates.
- Windows 8 Pro doesn't grant full remote access when using these tools, but it isn't immune and some slight variation of the code could make the OS vulnerable.
What Windows users need to know about the latest 'ShadowBrokers' exploits | Windows Central