Total Downloads

2,586,389

Total Files

9,224

Latest Update

10

Shadow Brokers threaten to release even more NSA-sourced malware

Posted May 16, 2017 | Windows


Late last night, someone claiming to represent Shadow Brokers—the people responsible for releasing stolen NSA hacking tools—posted a new message on the Steemit website. In a hard-to-fathom rant, the group makes several claims and also threatens to release even more damaging material.

I’ve loosely quoted Shadow Brokers’ post below, editing their statement heavily for clarity. Any translation errors are mine. Note that The Equation Group is a well-established “persistent threat” organization, widely thought to be tied to the NSA. 

Shadow Brokers feels that it was “being very responsible” about April’s dump—the one that resulted in WannaCrypt/WannaCry, and the potential for many more exploits. Last August, Shadow Brokers warned that The Equation Group had been hacked, and they had the goods. Shadow Brokers offered some of their wares at auction. To prove they had sufficiently interesting goods, they released The Equation Group’s 2013 firewall tools and an old Cisco zero-day exploit. Nobody believed Shadow Brokers.

Why an auction? Shadow Brokers is not interested in bug bounties, selling to “cyber thugs,” or “giving to greedy corporate empires.” They want to pick a worthy opponent. It’s always been about Shadow Brokers vs The Equation Group. But The Equation Group didn’t bid to buy back its wares; nor did any governments, tech companies, or security companies.

In December, Shadow Brokers cancelled the auction, and offered to sell pieces of the trove one at a time. Even then, there were no takers. So Shadow Brokers asked themselves why there were no bids. Perhaps nobody was interested because they didn’t believe Shadow Brokers had the good stuff.

In January, Shadow Brokers posted screenshots taken from programs on The Equation Group’s 2013 Windows Ops disk. When they posted the shots, they knew that The Equation Group would recognize them, and warn Microsoft.

(Shadow Brokers wrangler Matt Suiche acknowledges that “Shadow Brokers seems very well informed that *only* The Equation Group would have identified the vulnerabilities from those screenshots.”)

In February, Microsoft missed Patch Tuesday. Shadow Brokers said that it knows that Microsoft skipped Patch Tuesday to fix the exploits in the 2013 Windows Ops Disk. In March, Microsoft issued the patch for the SMB vulnerabilities. Oracle patched “huge number of vulnerabilities.” Shadow Brokers waited and didn’t release the exploits.

(That matches up precisely with the MS17-010 release, which tackled the SMB security holes, and conjectures many of us have had about the skipped February patches.)



Source link

')
ankara escort çankaya escort çankaya escort escort bayan çankaya istanbul rus escort eryaman escort ankara escort kızılay escort istanbul escort ankara escort ankara escort escort ankara istanbul rus Escort atasehir Escort beylikduzu Escort Ankara Escort malatya Escort kuşadası Escort gaziantep Escort izmir Escort