Home Security Shadow Brokers claims Microsoft hand-in-glove with NSA

Shadow Brokers claims Microsoft hand-in-glove with NSA

Shadow Brokers claims Microsoft hand-in-glove with NSA Featured

The group that released NSA exploits for Windows, which were used in massive ransomware attacks last weekend, has accused Microsoft of being hand-in-glove with The Equation Group, a group that is believed to be a front for the NSA.

In a rambling blog post in bad English — something that has become its trademark — Shadow Brokers also warned that there would be more dumps of exploits to come, advising those who were interested to expect an announcement in June.

Last year Shadow Brokers put up a number of hacking tools for sale, all of which it claimed to have stolen from The Equation Group.

Later the same year, Shadow Brokers released a list of what it said were servers that had been compromised by the NSA and used for attacking targets of the agency's choice.

"In January theshadowbrokers is deciding to show screenshots of lost theequationgroup 2013 Windows Ops Disk. TheShadowBrokers is knowing if showing screenshots, then vulnerabilities is being reported by theequationgroup to Microsoft and is being patched," the group wrote.

And in a reference to Microsoft preident and chief legal officer Brad Smith, Shadow Brokers wrote: "Despite what scumbag Microsoft Lawyer is wanting the peoples to be believing, Microsoft is being BFF with theequationgroup. Microsoft and theequationgroup is having very very large enterprise contracts millions or billions of USD each year."

Smith has slammed the CIA and NSA for stockpiling software exploits.

"TheEquationGroup is having spies inside Microsoft and other US technology companies. Unwitting HUMINT. TheEquationGroup is having former employees working in high-up security jobs at US Technology companies. Witting HUMINT.

"Russian, China, Iran, Israel intelligence all doing same at global tech companies. TheShadowBrokers is thinking Google Project Zero is having some former TheEquationGroup member. Project Zero recently releasing 'Wormable Zero-Day' Microsoft patching in record time, knowing it was coming? coincidence?" the group wrote.

Shadow Brokers said it would announce a monthly subscription model in June, with "TheShadowBrokers Data Dump of the Month" service.

It said these dumps would include:

  • Web browser, router, handset exploits and tools;
  • Select items from newer Ops Disks, including newer exploits for Windows 10;
  • Compromised network data from more SWIFT providers and Central banks; and
  • Compromised network data from Russian, Chinese, Iranian, or North Korean nukes and missile programmes.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications