In August, anonymous hacker(s) dumped a cache of cyberweapons that appeared to originate with The Equation Group, an elite, NSA-affiliated hacking squad.
The leakers called themselves The Shadow Brokers, and they sought bTc1,000,000 for access to the remainder of The Equation Group's files. Earlier this month, arrested NSA contractor Harold Thomas Martin was accused of being the source of the leak to The Shadow Brokers, though not necessarily deliberately (he may have been hacked by The Shadow Brokers).
The Shadow Brokers have had no takers for their auction, and so they're now dumping more files, presumably to stir up interest.
The new leak purportedly reveals IP addresses of NSA controlled servers in 49 countries that are used to launch offensives against NSA targets. If the leaks are to be believed, they show that the NSA uses hacked servers in China and Russia to attack other countries.
The dump contains some 300 folders of files, all corresponding to different domains and IP addresses. Domains from Russia, China, India, Sweden, and many other countries are included. According to an analysis by the security researcher known as Hacker Fantastic, the dump contains 306 domains and 352 IP addresses relating to 49 countries in total.
If accurate, victims of the Equation Group may be able to use these files to determine if they were potentially targeted by the NSA-linked unit. The IP addresses may relate to servers the NSA has compromised and then used to deliver exploits, according to security researcher Mustafa Al-Bassam.
“So even the NSA hacks machines from compromised servers in China and Russia. This is why attribution is hard,” Al-Bassam tweeted on Monday.
Message#5 — Trick or Treat?
[The Shadow Brokers/Medium]
NSA Hackers The Shadow Brokers Dump More Files
The Cyber Independent Testing Lab is a security measurement company founded by Mudge Zadko (previously), late of the Cult of the Dead Cow and l0pht Heavy Industries and the NSA's Tailored Access Operations Group; it has a unique method for assessing the security of devices derived from methods developed by Mudge at the NSA.
Well, pretty much everyone saw this lawsuit coming.
Andy Greenberg (previously) is Wired's senior security reporter; he did amazing work covering Russian cyberwarfare in Ukraine, which he has expanded into a forthcoming book: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (I read it for a blurb and a review; it's excellent).
We love our smartphones and tablets, but we also love to write. For a while now, there hasn’t been a workable solution. Either hook it up to a keyboard (which defeats the purpose of a portable gadget) or resign ourselves to typing on tiny, unresponsive glass icons. Looks like technology has finally caught up to […]
So you’ve got an iPhone 11 Pro Max. It’s an impressive piece of hardware – sometimes, too impressive. The more you’re compelled to use it, the more an age-old problem pops up: The dreaded low battery warning. Even if you’re on the go, perhaps the best solution to this is also pretty unobtrusive. It’s the […]
The good news: Software like Adobe Premiere Pro, Camtasia and Final Cut Pro has opened up a ton of possibilities for desktop videographers. On the other hand, their use is so widespread that you have to be an expert in them before you can even think about a career in the field. That’s a requirement […]