Hacking Group Claims To Sell Cyber-Weapons Stolen From NSA
On Monday, August 15, an anonymous hacking group calling itself the Shadow Brokers has claimed that they will sell a collection of files stolen from a spy group linked to the U.S. National Security Agency through an auction.
Shadow Brokers Hacking Group
According to Reuters, the hackers released samples of software tools they claim could break into popular firewall software, in order to increase interest in the auction. The software tools could bypass firewalls made by various cybersecurity companies, including Juniper Networks Inc, Cisco Systems Inc, and Fortinet Inc.
The Shadow Brokers made their claims on a Tumblr blog post written in imperfect English. Until now, neither the National Security Agency (NSA) nor the cyber security companies did comment on the claim.
The Auctioned Cyber-Weapons
The hacking group promised that the auctioned material would contain "cyber weapons" developed by the Equation Group. According to cyber security experts, the Equation Group could be an arm of the NSA.
The Shadow Brokers also claimed that the hacking tools they will auction will be "better than Stuxnet," a malicious computer worm attributed to Israel and the United States and use sabotage Iran's nuclear program.
According to Wired, the Shadow Brokers also released a sample of the stolen data to convince their potential customers of their claims. At least in part, the hacking group's claims might be true. Security researchers who downloaded the sample found some intriguing data, such as code matching up with actual exploits used by the NSA.
Claudio Guarnieri, a researcher at the University of Toronto's Citizen Lab specialized in state-sponsored malware analysis, said that the files auctioned by the hacking group look as if the NSA attacked someone who actually managed to counter-hack.
The code does corroborate some of the exploits from a catalogue leaked in 2013 by Snowden that lists software tools used by the NSA's Tailored Access Operations hacking team. However, it is unclear for now if the code can be attributed to NSA-linked hacker teams such as the Equation Group, according to Guarnieri.
Previous Microsoft Windows Patches Fixed Newly Leaked NSA Exploits
Microsoft announced it has already patched vulnerabilities reported in Friday’s high-profile leak of suspected U.S. NSA spying tools. This means that customers should be protected if they’ve kept their software up-to-date.
Microsoft's New Cybersecurity Engagement Center Opens In Mexico, Aims To Improve Users' Safety
Microsoft has publicly expressed their concern for the welfare of human beings in a global scale. This is the reason why they have extended their coverage of cybersecurity throughout Mexico to prevent the Latin American populace from being cyber attacked.
A Big Cyberattack Is Inevitable In 2017
According to security experts, in 2017 a big data breach is almost certain.
How Quantum Computing Will Change Cybersecurity?
Quantum computing might come sooner than expected and will make current encryption methods obsolete.
2016 Scandals And Controversies In Technology
2016 was riddled with controversies and the tech industry had its fair share. Here are five of them.
MORE IN ITECHPOST
Mobile Phone App Designed to Boost Physical Activity in Women Shows Promise in Trial
Activity trackers and mobile phone apps are all the rage, but do they really help users increase and maintain physical activity? A new study has found that one mobile phone app designed for inactive women did help when combined with an activity tracker and personal counseling.
AI and High-Performance Computing Extend Evolution to Superconductors
Materials by design: Argonne researchers use genetic algorithms for better superconductors.
Owners of thoroughbred stallions carefully breed prizewinning horses over generations to eke out fractions of a second in million-dollar races. Materials scientists have taken a page from that playbook, turning to the power of evolution and artificial selection to develop superconductors that can transmit electric current as efficiently as possible.