Home Security Hacker group finds no takers for NSA exploits

Hacker group finds no takers for NSA exploits

Hacker group finds no takers for NSA exploits Featured

The group that released a data dump containing exploit tools created by the US National Security Agency is apparently having difficulty finding buyers for the same.

Shadow Brokers, which is suspected of having ties to Russia, released the tools in mid-August, having obtained them from an outfit named the Equation Group which is suspected of being an NSA front.

In a message written in what looks to be purposely broken English, the group wrote: "Expert peoples is saying Equation Group Firewall Tool Kit worth $1million. TheShadowBrokers is wanting that $1million. TheShadowBrokers is selling Equation Group Warez. The Shadow Brokers Equation Group Auction is being real. If you peoples is being easily confuse, you be stopping here. If you peoples be wanting to know more then keeping reading."

Security researcher Mustafa Al-Bassam, a former member of the Anonymous hacking crew, has made a comprehensive list of the code released by Shadow Brokers and what each package can do. Referring to this, the Shadow Brokers' post said: Peoples is having interest in free files. But people is no interest in #EQGRP_Auction. The Shadow Brokers is thinking this is information communication problem."

After the data dump, networking vendor Cisco was forced to release patches for several products as several vulnerabilities in these products could be exploited using the tools that were part of the dump.

The NSA came under criticism after the dump for finding out vulnerabilities in commonly used products and keeping silent about them, as this appears to run contrary to published American government policy.

Whistleblower Edward Snowden, a former NSA contractor, and security expert Dave Aitel, who has worked for the NSA in the past, have both opined that the leak by Shadow Brokers was tied to an earlier leak of data about the Democratic National Committee that led to the resignation of its chairwoman, Debbie Wasserman Schultz.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications