"equation group"

How China grabbed NSA hacking tools and used them to attack U.S. allies

Chinese spies got a hold of NSA hacking tools, and “repurposed them in 2016 to attack American allies and private companies in Europe and Asia,” reports the NYT. How'd they get those cyberweapons? Symantec researchers “believe the Chinese did not steal the code but captured it from an N.S.A. attack on their own computers — like a gunslinger who grabs an enemy’s rifle and starts blasting away.” Read the rest

Kaspersky's explanation for possessing secret NSA cyberweapons is a doozy

Kaspersky -- a respected Russia-based security company -- has been under a cloud since they were accused of stealing NSA cyberweapons on behalf of the Russian government. But the company has a perfectly innocent -- if complicated and at times bizarre explanation for how it came to be in possession of the NSA's crown jewels. Read the rest

The Shadow Brokers dump more intel from the NSA's elite Equation Group

In August, anonymous hacker(s) dumped a cache of cyberweapons that appeared to originate with The Equation Group, an elite, NSA-affiliated hacking squad. Read the rest

The Equation Group's sourcecode is totally fugly

With the leak of exploits developed by The Equation Group, the long-secret, NSA-adjacent super-elite hacking squad -- published by The Shadow Brokers, who have some extremely heterodox theories about auction design -- it's now possible to audit the source code of some of the NSA's crown-jewel cyberweapons. Read the rest

The NSA's program of tech sabotage created the Shadow Brokers

The more we learn about the Shadow Brokers, who claim to be auctioning off "cyberweapons" that crafted for the NSA's use, the scarier the breach gets: some of the world's biggest security companies are tacitly admitting that the exploits in the Shadow Brokers' initial release can successfully penetrate their products, and they have no fix at hand. Read the rest

Was NSA Hacked? Leak from 'Shadow Brokers' suggests so, Russian intelligence suspected

As our Cory Doctorow reported previously, a previously unheard of hacker group calling themselves The Shadow Brokers announced this week it had stolen a trove of ready-to-use cyber weapons from The Equation Group (previously), an advanced cyberweapons dealer believed to be operating on behalf of, or within, the NSA.

The Shadow Brokers are auctioning the weaponized malware off to the highest bidder. Read the rest

Snowden explains the Shadow Brokers/Equation Group/NSA hack

The news that a group of anonymous hackers claimed to have stolen some of the NSA's most secret, valuable weaponized vulnerabilities and were auctioning them off for bitcoin triggered an epic tweetstorm from Edward Snowden, who sets out his hypothesis for how the exploits were captured and what relation that has to the revelations he made when he blew the whistle on illegal NSA spying in 2013. Read the rest

Hackers claim to have stolen NSA cyberweapons, auctioning them to highest bidder

The Shadow Brokers, a previously unknown hacker group, has announced that it has stolen a trove of ready-to-use cyber weapons from The Equation Group (previously), an advanced cyberweapons dealer believed to be operating on behalf of, or within, the NSA. Read the rest

Blandly is a full-service blanding agency

Tired of bad publicity? Terrified of the social media snarls that consume unwary brands daily? Your company needs Blandly, a full-service media agency that can bury you in a colorless mush of vacuous positivity, thereby guaranteeing your disappearance from the public imagination.

BLANDLY IS A FULL-SERVICE BLANDING AGENCY.

We specialize in bland identity, bland development, bland strategy, blandbuilding, bland positioning, digital blanding, fully integrated blanding campaigns, bland UI/UX design, and bland environments.

BLANDLY CREATES AWARD-WINNING BLAND SOLUTIONS FOR OUR CLIENTS.

From technology startups and trendy restaurants to established multinational blands, we work with each of our clients to develop innovative approaches that deliver measurable value.

WE ARE BLAND STORYTELLERS

The homepage is a great exemplar of the minimalist-but-not-really monosite that's basically every website now. Read the rest

Three steps to save ourselves from firmware attacks

Following on the news that the (likely NSA-affiliated) Equation Group has developed a suite of firmware attacks that target the software embedded in your hard-drive and other subcomponents, it's time to expand the practice of information security to the realm of embedded software. Read the rest

NSA has ability to embed spying software in computer hard drives, including yours

The agency can hide software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, reports Kaspersky Labs.

Shining light on the shadowy, "superhuman" state-level Equation Group hackers

For more than decade, a shadowy, heavily resourced, sophisticated hacker group that Kaspersky Labs calls the Equation Group has committed a string of daring, cutting-edge information attacks, likely at the behest of the NSA. Read the rest

:)