Stolen NSA Cyberweapons Auctioned: Shadow Brokers Wants $6.3 million To Publish Hacking Tools' Password
Anonymous hacker group Shadow Brokers is now threatening to publish the NSA´s hacking tools' password to everyone who pays $6.3 million or 10,000 bitcoins. This action comes weeks after the group complained how nobody was interested in the bidding, wanting the tool for free.
Stolen NSA Cyberweapons Are Real
The group who´s claimed responsibility for stealing and leaking powerful cyberweapons believed to be used by cyberteam Equation Group, have been in a contradictory situation, since many experts ended up confirming the legitimacy of the NSA´s hacking tools, most of them capable of skirting enterprise firewalls. However, they also explained that this action is incredibly nonsense, considering the fact that bitcoins are extremely traceable, as reported by Softpedia.
"TheShadowBrokers is being bored with auction so no more auction. Auction off. Auction finish. Auction done. No winners. So who is wanting password? TheShadowBrokers is publicly posting the password when receive 10,000 btc (ten thousand bitcoins). Same bitcoin address, same file, password is crowdfunding. Sharing risk. Sharing reward. Everyone winning." The hacking group told recently in a blog post, in which it also announced to leak a conversation between Bill Clinton and Attorney General Loretta Lynch in an airplane.
Shadow Brokers Offer Is Predestinated To Fail
According to the International Business Times, Shadow Brokers initially released around 60 percent of the entire cache for free, including zero-day vulnerabilities against Cisco, but failed to garner any response. Apparently, this new offer can also be predestinated to fail, considering the lack of interest that people have showed about NSA´s cyberweapons.
Although the group´s background and it still unknown, four different sources recently told that the NSA think that Russian hackers might be involved. Apparently, these cyber criminals got hold of the exploits after a contractor or even an employee was careless enough to leave them available on a computer. Is very likely that this situation happened about three years ago, after an operation in which the NSA had to use the tools.
Hackers Target SWIFT Users Using Bangladesh Heist Methods
The hackers could be the cybercriminal group Carbanak, which has stolen over than $1billion around the world.
Hackers Are Taking Advantage Of Hurricane Matthews In South Carolina
Cyber Criminals are sending scam emails to get into South Carolina people´s computers. Residents are facing an invisible threat that could take their personal information.
Two Russians Tried To Export US Military Technology
It has not been proven that Putin´s government is behind this action.
‘Orange Is The New Black' Season 5 Leaked By Hackers, The Dark Overlord Call Out Network Giants
Netflix was hacked the other day and the hackers who call themselves "The Dark Overlord" are not yet finished with the streaming giant. Also, they called out ABC, NBC and NAT Geo.
Previous Microsoft Windows Patches Fixed Newly Leaked NSA Exploits
Microsoft announced it has already patched vulnerabilities reported in Friday’s high-profile leak of suspected U.S. NSA spying tools. This means that customers should be protected if they’ve kept their software up-to-date.
MORE IN ITECHPOST
How Scars are Formed and How to Remove It
Scar formation is a result of a biological process in skin after an injury or trauma. It is formed when the dermis layer of the skin is damaged. It is our body's way to repair tissues and organs and is a natural part of the healing process. A scar tissue is composed of the same type of collagen it is replacing with. Scars lacks elasticity compared to normal tissue. There are different degrees of scarring depending on the injury the tissue is subjected to.
Johns Hopkins Researchers Discover Material That Could Someday Power Quantum Computer
Quantum computers with the ability to perform complex calculations, encrypt data more securely and more quickly predict the spread of viruses, may be within closer reach thanks to a new discovery by Johns Hopkins researchers.
Black Holes Stunt Growth of Dwarf Galaxies
UC Riverside astronomers find large-scale winds associated with active black holes in small galaxies suppress star formation
'Resident Evil 6' and 'Resident Evil 5' Demos are Now Available on Nintendo Switch
Fans of "Resident Evil" can finally play the demos for the fifith and sixth installment on Switch.