The Shadow Brokers, a previously unknown hacker group, has announced that it has stolen a trove of ready-to-use cyber weapons from The Equation Group (previously), an advanced cyberweapons dealer believed to be operating on behalf of, or within, the NSA.
The Shadow Brokers have already dumped a selection of weaponized exploits along with an open letter offering to sell more of the same in exchange for one million bitcoin ($568m). Security researchers who've looked at the samples say they appear to be very advanced, ready-to-use exploits, and appear to be related to previously leaked NSA exploits, though nothing directly links them to The Equation Group.
“If this is a hoax, the perpetrators put a huge amount of effort in,” the security researcher known as The Grugq told Motherboard. “The proof files look pretty legit, and they are exactly the sorts of exploits you would expect a group that targets communications infrastructure to deploy and use.”
Claudio Guarnieri, an independent security researcher who’s investigated other hacking operations by the Western intelligence agencies, told me that the files might be from a hacked NSA server used in an operation. He also cautioned that this is a preliminary analysis and that more analysis is needed.
The most recent file is dated June 2013, though the hackers could have tampered with the dates. Dmitri Alperovitch, the co-founder of security firm CrowdStrike, theorized that “the leakers were probably sitting on this information for years, waiting for the most opportune time to release.”
Matt Tait, another security researcher and former British intelligence officer, tweeted that the data could come from “an old counter-hack.”
Hackers Say They Hacked NSA-Linked Group, Want 1 Million Bitcoins to Share More
Last year, California was one of several states to introduce right to repair legislation that would force companies to end practices that discourage the independent repair sector, creating a requirement to sell replacement parts, provide documentation, and supply codes to bypass DRM systems that locked new parts out of devices until the company activated them.
The term "meritocracy" was popularized in the UK sociologist Michael Young's 1958 novel, "The Rise of the Meritocracy," in which aristocrats insist that they are the natural rulers of their society based on "objective" measures of worth ("merit" + "aristocracy" = "meritocracy") that are obviously tilted to favor them, a fact that they are conveniently […]
A year ago, smarting over public criticism of its role in promoting division and stoking racism, Facebook announced a major shift in its newsfeed algorithm which would downrank posts from media organizations and uprank the things sent by your friends on the network, in the name of promotion a gentler form of "engagement" that would […]
Seems like drones are doing a lot of jobs these days, from reconnaissance to delivery. Now, we can add “keeping the Death Star safe” to that list. Whether you’re a drone enthusiast or a Star Wars fan, these Star Wars Propel Drones are undeniably the coolest toy around. Yes, that’s a fully functional drone replica […]
It’s spring clearance time for the Boing Boing Store, when some of the best deals from the holidays return even cheaper than before. From top-rated apps to educational software to the cutest record player of all time, they’re all back with a little extra incentive. Shop your heart out before tax season wraps up! Use […]
Big companies want automation on a big scale. Doing that means diving into the tricky world of machine learning and data science. And no matter what platform you’ll be implementing it on, you can learn how with the Machine Learning & Data Science Certification Training Bundle. In 48 hours and through eight courses, this bundle […]