Chinese hackers cloned a Windows security flaw stolen from the NSA

Hacker
(Image credit: TheDigitalArtist / Pixabay)

The investigation into a malware tool being used by Chinese hackers has revealed it to be a copy of software reportedly originally developed by part of the US National Security Agency (NSA).

Security researchers at Check Point Research (CPR) originally thought the tool dubbed Jian was custom built by Chinese threat actors. However further CPR digging revealed that it is a clone of the EpMe software, which was used by the Equation Group, which has long been suspected to operate on the behest of the NSA.

According to ZDNet, CPR notes that "the tool is used after an attacker gains initial access to a target computer -- say, via zero-click vulnerability, phishing email, or any other option -- to give the attacker the highest available privileges, so they could "roam free" and do whatever they like on the already infected computer."

Leaked and repurposed

Both Jian and EpMe exploit the Windows privilege escalation vulnerability tracked as CVE-2017-005. Researchers add that the tools exploited the vulnerability between 2014 and 2017, before it was finally patched by Microsoft.  

While originally thought to be custom built by a Chinese advanced persistent threat group (APT) called APT31, also known as Zirconium, the researchers now believe the tool was part of a series of leaks by the Shadow Brokers group in 2017. It was then "repurposed" to attack US citizens.  

Interestingly, it is reported that this is not the only example of a Chinese APT stealing and repurposing tools originally developed by the NSA. In another case documented by Symantec back in 2019, threat actors known as Buckeye were also found to be using tools developed by the Equation Group, prior to the Shadow Brokers leak.  

Via: ZDNet

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Latest in Security
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Avast cybersecurity
UK cybersecurity sector could be worth £13bn, research shows
An option to add Ambient Music buttons to the iOS 18.4 Control Center.
Apple fixes dangerous zero-day used in attacks against iPhones and iPads
Trump
Hackers are abusing $TRUMP tokens to lure victims in to new phishing scam
Latest in News
GTA 5
GTA Online publisher Take-Two is gunning for a black market that’s basically heaven for cheaters
The Discovery+ homepage
Discovery+ just got a big update to its streaming app that makes it more like Max – here are 5 great new features to try
Two Android phones on a green and blue background showing Google Messages
Struggling with slow Google Messages photo transfers? Google says new update will make 'noticeable difference'
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Meet create custom backgrounds
More AI features are coming to Google Workspace
Elayne, Egwene, and Nynaeve dressed regally and on horseback in The Wheel of Time season 3
'There's a reason why we do it': The Wheel of Time showrunner responds to fans who are still upset over the Prime Video show's plot alterations