Security Market Segment LS
Friday, 06 September 2019 11:08

NSA exploit EternalRomance 'formed basis for alleged Chinese tool'

NSA exploit EternalRomance 'formed basis for alleged Chinese tool' Image by pen_ash from Pixabay

An exploitation tool for Windows systems, used by an alleged Chinese hacking collective, uses a variant of an NSA exploit which was leaked online by a group known as the Shadow Brokers, the Israeli security company Check Point claims, adding that their findings suggested China and the US were in some kind of race to develop cyber exploits.

Researchers Mark Lechtik and Nadav Grossman said in first offered NSA exploits that the hacking group, known variously as APT3 and Gothic Panda, had based its exploitation tool, dubbed Bemstour, on an NSA exploit known as EternalRomance.

In May, the American security outfit Symantec said the same Chinese collective, to which it gave the name Buckeye, had been using the NSA exploits well before they were leaked by the Brokers.

Lechtik and Grossman said they had built on the Symantec research. "One of the key findings in their (Symantec) publication was that variants of the Equation (Group – a term used by Russian security firm Kaspersky to refer to the NSA) tools were used by the group prior to ‘The Shadow Brokers’ public leak in 2017," they wrote.

"Moreover, it seems that APT3 developed its own in-house capabilities and equipped its attack tool with a 0-day that targeted the Windows operating system."

The Check Point researchers concluded that APT3 developed their tool based on analysis and understanding of the vulnerability leveraged by EternalRomance.

"If network traffic was indeed used by the group as a reference, the traffic was likely collected from a machine controlled by APT3," Lechtik and Grossman said.

"This means either a Chinese machine that was targeted by the NSA and monitored by the group, or a machine compromised by the group beforehand on which foreign activity was noticed. We believe the former is more likely, and in that case could be made possible by capturing lateral movement within a victim network targeted by the Equation group."

Once the Chinese group had developed their exploit, they looked for a zero-day in order to ensure that multiple versions of Windows could be attacked. This suggested that APT3 had developed its own tool after analysis, Lechtik and Grossman said.

They reasoned that if the Chinese group had used the same exploit as that from the NSA, then there would have been no need to hunt for a zero-day as one was already present.

To date, there has been no indication as to the identity of the Brokers who first offered NSA exploits for sale in 2016, and later, finding no takers, dumped said exploits which included DoublePulsar, EternalBlue, EternalRomance and EternalSynergy.

EternalBlue was used to craft the WannaCry ransomware which wreaked havoc on companies and organisations in May 2017.


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments