Shadow Broker exploit dumps five million cyber attacks
Kaspersky: Hacking tool leaks fuel cyber criminal activity


More than five million cyber attacks originated from a series of exploit archives dumped onto the internet between April and June this year, according to Kaspersky Lab.
Its software blocked more than five million attacks based on hacking group Shadow Brokers' exploit dumps, but the rate of attacks using these tools is growing; more than 80% were detected during the last 30 days of the quarter.
"The threat landscape of Q2 provides yet another reminder that a lack of vigilance is one of the most significant cyber dangers," said Kaspersky Lab security expert Alexander Liskin.
"While vendors patch vulnerabilities on a regular basis, many users don't pay attention to this, which results in massive-scale attacks once the vulnerabilities are exposed to the broad cyber criminal community."
Shadow Brokers has already had a huge impact of the security landscape. The mysterious group began releasing huge troves of offensive malware and cyber weapons last year, many of which were allegedly created and used by US intelligence agencies such as the NSA.
The latest dump, which occurred in April this year, included a number of highly sophisticated tools. It was considered by many experts to be one of the most dangerous and damaging leaks in cyber security history.
Alongside codenamed exploits including DarkPulsar, OddJob and FuzzBunch, the dump included the EternalBlue exploit targeting elements of the Windows OS. This malware in particular was an instrumental part of the WannaCry ransomware that nearly crippled organisations including the NHS, before it was stopped by security researcher Marcus Hutchins.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
MongoDB CISO: Don’t be afraid to simplify important issues for executives
News Preparation, transparency, and honesty are key for any CISO engaging with board executives
By Ross Kelly
-
CISOs are missing holidays due to excessive overtime
News Tessian research shows an alarming number of security leaders are sacrificing important areas of their life for the job
By Connor Jones
-
Biden campaign security chief becomes Federal CISO
News Chris DeRusha brings public and private sector experience to the role
By Danny Bradbury
-
NSA issues guidance on encrypted DNS usage
News The US National Security Agency warns enterprises not to use third-party DNS resolvers
By Danny Bradbury
-
IT Pro Panel: The worst IT horror stories
IT Pro Panel Our Panellists share some of their best tales from life on the front-lines of technology
By Adam Shepherd
-
CISO job description: What does a CISO do?
In-depth A chief information security officer deals with far more than firewalls and antivirus software
By Maggie Holland
-
What is an MSSP?
In-depth Why appointing an MSSP is becoming the norm for SMBs
By Keumars Afifi-Sabet
-
IT Pro Panel: How CIOs got their first breaks in IT
IT Pro Panel It may seem like a simple pathway from the outside, but a CIO's first taste of IT comes in many different forms
By Sooraj Shah