Hacking Group Claims To Sell Cyber-Weapons Stolen From NSA
On Monday, August 15, an anonymous hacking group calling itself the Shadow Brokers has claimed that they will sell a collection of files stolen from a spy group linked to the U.S. National Security Agency through an auction.
Shadow Brokers Hacking Group
According to Reuters, the hackers released samples of software tools they claim could break into popular firewall software, in order to increase interest in the auction. The software tools could bypass firewalls made by various cybersecurity companies, including Juniper Networks Inc, Cisco Systems Inc, and Fortinet Inc.
The Shadow Brokers made their claims on a Tumblr blog post written in imperfect English. Until now, neither the National Security Agency (NSA) nor the cyber security companies did comment on the claim.
The Auctioned Cyber-Weapons
The hacking group promised that the auctioned material would contain "cyber weapons" developed by the Equation Group. According to cyber security experts, the Equation Group could be an arm of the NSA.
The Shadow Brokers also claimed that the hacking tools they will auction will be "better than Stuxnet," a malicious computer worm attributed to Israel and the United States and use sabotage Iran's nuclear program.
According to Wired, the Shadow Brokers also released a sample of the stolen data to convince their potential customers of their claims. At least in part, the hacking group's claims might be true. Security researchers who downloaded the sample found some intriguing data, such as code matching up with actual exploits used by the NSA.
Claudio Guarnieri, a researcher at the University of Toronto's Citizen Lab specialized in state-sponsored malware analysis, said that the files auctioned by the hacking group look as if the NSA attacked someone who actually managed to counter-hack.
The code does corroborate some of the exploits from a catalogue leaked in 2013 by Snowden that lists software tools used by the NSA's Tailored Access Operations hacking team. However, it is unclear for now if the code can be attributed to NSA-linked hacker teams such as the Equation Group, according to Guarnieri.
Previous Microsoft Windows Patches Fixed Newly Leaked NSA Exploits
Microsoft announced it has already patched vulnerabilities reported in Friday’s high-profile leak of suspected U.S. NSA spying tools. This means that customers should be protected if they’ve kept their software up-to-date.
Microsoft's New Cybersecurity Engagement Center Opens In Mexico, Aims To Improve Users' Safety
Microsoft has publicly expressed their concern for the welfare of human beings in a global scale. This is the reason why they have extended their coverage of cybersecurity throughout Mexico to prevent the Latin American populace from being cyber attacked.
A Big Cyberattack Is Inevitable In 2017
According to security experts, in 2017 a big data breach is almost certain.
How Quantum Computing Will Change Cybersecurity?
Quantum computing might come sooner than expected and will make current encryption methods obsolete.
2016 Scandals And Controversies In Technology
2016 was riddled with controversies and the tech industry had its fair share. Here are five of them.
MORE IN ITECHPOST
3 Free Ways to Track a Cell Phone by Number
Check out our three verified methods to track a cell phone using their number. Signup to Spyic now for free and access the phone’s location in real-time. Use it in any Android or iOS device without rooting or jailbreaking. See also Cocospy and Spydialer.
A New Material for the Battery of the Future, Made in UCLouvain
Renewable sources of energy such as wind or photovoltaic are intermittent. The production peaks do not necessarily follow the demand peaks.
Top 5 Video Games to Play for a Truly Unique First Date
Video games have a way of taking us outside of ourselves and live in a fantasy world. It's even better when you're playing a game with someone special!