Jump to content

Shadow Brokers hackers release NSA hacking tools


dufus

Recommended Posts

Shadow Brokers hackers release NSA hacking tools to punish Trump for ‘abandoning’ his base

Published time: 9 Apr, 2017 02:51Edited time: 9 Apr, 2017 08:12
Shadow Brokers hackers release NSA hacking tools to punish Trump for ‘abandoning’ his base
Hacking group Shadow Brokers has released the password to a trove of NSA exploits in what they say is a form of protest against President Donald Trump for going back on his campaign promises, and warning the president, “Don’t forget your base.”

The shadowy group first emerged last August and released hacking exploits used by the NSA’s Equation Group, which included vulnerabilities in firewall products, and a list of IP addresses the NSA had exploited, which the group released at a later date.

https://www.rt.com/usa/384082-shadow-brokers-nsa-password-trump/

 

Look at RT link

Link to comment
Share on other sites


  • Replies 9
  • Views 791
  • Created
  • Last Reply

They had them since 2016 for sale on the darknet  and no one would buy  them  .because they didn't want yo be pwned by the NSA

Quote

 

      Today's #ShadowBrokers NSA dump shows hacking attacks on EU states, LatAm, Russia, China, Japan & South East Asia https://t.co/Gtz4JFst8O      — WikiLeaks (@wikileaks) April 8, 2017 

 

NSA whistleblower has also joined the conversation, saying that the files fall short of the fully hacking catalog of NSA.      …much here that NSA should be able to instantly identify where this set came from and how they lost it. If they can't, it's a scandal.      — Edward Snowden (@Snowden) April 8, 2017 

 

Snowden has also expressed concerns that the leak might backfire. He said that NSA can identify where and how the hacking kit leaked.  Are these hacking tools going to create a stir? At the moment, it’s hard to say. In the future, we can also expect to witness more leaks.

 

https://fossbytes.com/nsa-hacking-tools-shadow-brokers/

The Shadow Brokers may of just helped the NSA out  .1. They didnt  get  sold to someone else that would of used them. 2. The NSA will most likely find out who the mole was  that leaked them. or find out who hacked them and patch any holes in there system if they was hacked 3 The NSA and everybody known they had  NSA hacking tools  for a long time .

 

Snowden knows all about leaking backfiring  he barely escaped and if he ever tries to leave Russia he most likely will get caught   Same with Julian Assange who is stuck in that embassy in the UK .Everyone is scared  to get him out and take him to Ecuador to get freedom because they would go too jail along time for trying help him escape too freedom. Hes already in jail in a fancy prison .

 

I dont know of any case of anyone leaking info it turned out good for them if they know who it was, unless they was pardoned and still they are labeled a trader In the USA only part of the people thanks what Snowden done was for the good .But the ones that matter thinks what he done was wrong.

 

Leaks are nothing new too the USA only thing that is new is most people are aware  5 minutes after it happens  and can read about them. on the internet .

Quote

Leaks and overclassification are ubiquitous in American government. As early as 1948, journalist Bruce Catton declared that “our particular form of government wouldn’t work” without leaks. By the 1980s, according to a study by the Harvard Kennedy School’s Institute of Politics, some 42 percent of federal policymakers had leaked information to journalists

http://www.politico.com/magazine/story/2016/03/the-forgotten-1957-trial-that-explains-our-countrys-bizarre-whistleblower-laws-213771

The USA own lawmakers  have been reasonable for most leaks  up tell 2013 when Federal agencies got sloppy and started hiring temporary workers (3rd party contractors )..Now they got 2 sets of leakers but most of the time it's a inside job.

 

Just like the CIA leaks  Snowden leaks etc these leaks didn't even happen under Trumps watch no way . All the leaks i seen so far this year are not anything new from 2017  they was all stolen or hacked into under Obama and the democrat's watch.

 

It's sort of like Bush  getting the blame for all the jobs that went overseas when it was Bill Clinton who signed it into law. This was all because of under Obama and the democrats National security was at a all time low,  things were almost as bad as right before 9-11 when Bush took office and  was left  with the National security Bill Clinton had in place were he cut Government funding really bad to get the economy  going good again.

 

In the USA now if you get caught for anything  no matter how  minor and you're visiting  or a illegal alien  from somewhere else ICE will deport you back .

 

ICE deports convicted Russian spy

http://thehill.com/policy/international/russia/327460-ice-deports-convicted-russian-spy

Hundreds of illegal immigrants arrested during ICE raids across the U.S

http://www.theblaze.com/news/2017/02/11/hundreds-of-illegal-immigrants-arrested-during-ice-raids-across-the-u-s/

 

Link to comment
Share on other sites


Shadow Brokers... seems familiar. Yes, Mass Effect 2 also has a "Shadow Brokers" :D

Link to comment
Share on other sites


3 hours ago, x3r0 said:

Shadow Brokers... seems familiar. Yes, Mass Effect 2 also has a "Shadow Brokers"

Good game not real though

Link to comment
Share on other sites


nsa-hacking-tools-dumped-online-by-shado

 

The NSA has a leaking problem

 

The Shadow Brokers, a hacking group, has published the password to a collection of hacking tools used by the NSA. This comes as a form of protest against Donald Trump going back on his campaign promises. 

 

Before releasing all the data into the wild, the hackers had actually put the data up for auction, but nobody bought it, perhaps due to the steep asking price of over $7 million in bitcoin. Now, the group revealed a password that unlocks an encrypted cache of documents in a Medium post

 

In that particular Medium post, the group complains about Donald Trump failing to make America great again. They question the President's position on Obamacare, Bannon's removal from the NSC and the increased involvement of the United States in a foreign war, namely the Syrian situation. 

 

Security researchers and, certainly, hackers too are looking into the contents of the leak. The archive contains roughly 300MB of data, including some firewall exploits and scripts with cryptonyms like BLASTING, BUZZDIRECTION and so on. 

 

Precious data trove

 

The list includes servers that the NSA allegedly hacked into and perhaps even used to launch malware attacks, a framework called TOAST which is used to clean server logs and clear the NSA's tracks and a new set of tools used to hack into servers like PITCHIMPAIR. 


The password The Shadow Brokers provided unlocks the hacking tools, which is worrisome because now everyone has access to these files, including people that may seek to do harm. WikiLeaks looked into the files and said the dump includes hacking attacks on EU states, Russia, China, Japan, and South East Asia. 

 

Edward Snowden, the NSA whistleblower that is currently in Russia, has confirmed that the leak includes authentic NSA software, although it's not the entire tools library. 

 

"Quick review of the Shadow Brokers leak of Top Secret NSA tools reveals it's nowhere near the full library, but there's still so much here that NSA should be able to instantly identify where this set came from and how they lost it. If they can't, it's a scandal," Snowden wrote on Twitter. 

 

Source

Link to comment
Share on other sites


The New Shadow Brokers Leak Connects the NSA to the Stuxnet Cyber Weapon Used on Iran

Researchers have found an hidden gem inside the treasure trove of the new alleged NSA hacking tools dumped by the Shadow Brokers.

The mysterious hacking group known as Shadow Brokers came back on Friday to drop its most explosive—and damaging—dump yet, a collection of alleged hacking tools for Microsoft Windows computers.

Buried among this new treasure trove, there are several mentions of previously disclosed NSA top secret programs and software such as "STRAITBIZARRE," used to control implants remotely, and "JEEPFLEA," a project to hack the money transferring system SWIFT. These provide yet another hint that these are indeed tools stolen from the NSA's elite hacking team. 

Perhaps more surprisingly, the dump also included one tool that was used in the famous Stuxnet worm, arguably the world's first digital weapon, used to hit an Iranian nuclear power facility and damage its centrifuges to slow down the country's nuclear weapons program.

 

The tool that appears to link the new dump and the famous digital weapon is an exploit for Windows' MOF files, which appears to be "almost the exact same script" used in Stuxnet, according to Liam O'Murchu, a researcher at Symantec who's thoroughly analyzed the worm.

Read more: A Brief Interview with The Shadow Brokers, The Hackers Selling NSA Exploits

"There is a strong connection between Stuxnet and the Shadow Brokers dump," O'Murchu told Motherboard in an email. "But not enough to definitively prove a connection."

O'Murchu explained that the connection is strong, but not definitive, because the common script, originally discovered in Stuxnet, was later reverse engineered and added by researchers to Metasploit, a popular open source hacking toolkit. This means anyone using Metasploit can create a MOF file that looks exactly like the one Stuxnet used. But, O'Murchu added, the MOF file creation tool dumped by the Shadow Brokers on Friday was last compiled on September 9, 2010, three months after Stuxnet was first detected, and "shortly before the code was added to Metasploit," according to O'Murchu.

Here's the script from Stuxnet.

1492410047874-Screen-Shot-2017-04-17-at-

And here's the script dumped by The Shadow Brokers on Friday.

 
1492410064886-Screen-Shot-2017-04-17-at-

Other researchers also noticed some apparent links to Stuxnet, both the MOF exploit, as well as a less obvious reference such as a ASCII art inside a dumped tool with a "WON THE GOLD MEDAL" writing. The top secret codename for Stuxnet's operation was reportedly "Olympic Games."

Also, strangely, other exploits dropped by the Shadow Brokers on Friday get detected as Stuxnet by the antivirus program Avast, according to Virus Total, an online malware repository.

While this could be a false positive, according to Joxean Koret, a security researcher with experience analyzing antivirus software, "it's too curious of a false positive."

The US government has never officially acknowledged that Stuxnet was created and launched by the NSA, allegedly with help from Israeli government hackers, as reports have suggested. But that's almost an open secret at this point. The Shadow Brokers have long claimed that the tools they release are from the "Equation Group," the name of a government hacking group outed by Kaspersky Lab in 2015, which is widely believed to be the NSA.

Therefore, the Stuxnet MOF file creation tool that the Shadow Brokers dropped on Friday is possibly the earliest technical evidence that NSA hackers and developers coded Stuxnet, as many suspect.

Of course, it's also possible that whatever group The Shadow Brokers have exposed simply gained access to the Stuxnet tools secondhand, and reused them.

But given that the Equation Group was already widely believed to be the NSA, and the NSA was already previously reported to be involved in the development and deployment of Stuxnet, this is yet another breadcrumb, perhaps the first one found in code, pointing toward NSA hackers as having developed Stuxnet.

https://motherboard.vice.com/en_us/article/shadow-brokers-nsa-stuxnet-iran

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...