Microsoft Patches Windows Exploits Shadow Brokers Allegedly Stole From NSA

Airbnb’s new logo called a Bela symbolizes belonging the company said

Files released by "Shadow Brokers" also suggest the NSA exploited weaknesses in Microsoft Windows products. The NSA did take advantage of that and got access to the system using these vulnerabilities, confirmed Suiche in that blog post. Microsoft offers Auto Update to tell you when updates are available for your machine. Exploits are small programs for taking advantage of security flaws. Belgium-based Swift downplayed the risk of attacks employing the code released by hackers.

He added that NSA "completely hacked" EastNets, one of two SWIFT service bureaus named in the documents that were released by the Shadow Brokers. Hence they had not been patched. Three of the NSA exploits, which Microsoft indexes as MS17-010, CVE-2017-0146, and CVE-2017-0147, have not been patched but do not work on programs that Microsoft now supports, according to Ars Technica. SWIFT stated that there was no indication that their main network had been accessed by unauthorized users.

The Shadow Brokers' leaks indicate that the NSA infiltrated a Dubai company that helps manage transactions in the worldwide bank messaging system Swift.

Because tracking sources of terrorist financing and money flows among criminal groups is a high priority, SWIFT transfers would be a natural espionage target for many national intelligence agencies.

Not all of the exploits released in the latest Shadow Brokers data dump are ancient.

The NSA's official seal appeared on one of the slides in the presentation, although Reuters could not independently determine the authenticity of the slides.

Microsoft also said that, 'Of the three remaining exploits, "EnglishmanDentist", "EsteemAudit", and "ExplodingCan", none reproduces on supported platforms, which means that customers running Windows 7 and more recent versions of Windows or Exchange 2010 and newer versions of Exchange are not at risk.

Another exploit, dubbed EmeraldThread, is a remote Windows SMB exploit for Windows XP and 2003.

Microsoft says they are looking at, and working to patch, the vulnerabilities, but for obvious security reasons, they're not going into much detail about the tools. No such acknowledgment was found in the March 14 update.

He said the malicious code published on Friday appeared to exploit previously undiscovered weaknesses in older versions of its Windows operating system - the mark of a sophisticated actor and a potential worry for many of Windows' hundreds of millions of users. Ars Technica noted that the updates, indexed as MS17-010, CVE-2017-0146 and CVE-2017-0147, do not make mention of the group or person who reported the vulnerabilities to Microsoft. "The EastNets Network internal Security Unit has run a complete check of its servers and found no hacker compromise or any vulnerabilities", the bureau said in a statement.