{"id":46277,"date":"2016-08-16T06:25:33","date_gmt":"2016-08-16T10:25:33","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=46277"},"modified":"2016-08-16T06:29:00","modified_gmt":"2016-08-16T10:29:00","slug":"46277","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=46277","title":{"rendered":"NSA malware being peddled by &#8216;shadow brokers&#8217;?"},"content":{"rendered":"<h1><strong>\u2018Shadow Brokers\u2019 Claim to be Selling NSA Malware, in What Could Be Historic Hack<\/strong><\/h1>\n<section class=\"article-meta\">\n<h3 class=\"dek\">Programs posted online allow espionage on network devices.<\/h3>\n<\/section>\n<p><!--more--><\/p>\n<p>By <span class=\"author\">Elias Groll<a class=\"author\" title=\"Elias Groll\" href=\"http:\/\/foreignpolicy.com\/author\/elias-groll\"><br \/>\n<\/a>Foreign Policy<\/span><\/p>\n<p><a href=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/08\/gettyimages-57585409crop.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46281\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/08\/gettyimages-57585409crop.jpg\" alt=\"gettyimages-57585409crop\" width=\"675\" height=\"323\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/08\/gettyimages-57585409crop.jpg 960w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/08\/gettyimages-57585409crop-300x144.jpg 300w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/08\/gettyimages-57585409crop-768x368.jpg 768w\" sizes=\"auto, (max-width: 675px) 100vw, 675px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<div class=\"shares-position \">\n<p>A mysterious online group calling itself \u201cThe Shadow Brokers\u201d is\u00a0<a href=\"http:\/\/theshadowbrokers.tumblr.com\/\" target=\"_blank\">claiming<\/a> to have penetrated the National Security Agency, stolen some of its malware, and is auctioning off the files to the highest bidder.<\/p>\n<p>The authenticity of the files cannot be confirmed but appear to be legitimate, according to security researchers who have studied their content. Their release comes on the heels of a <a href=\"http:\/\/foreignpolicy.com\/2016\/07\/25\/moscow-brings-its-propaganda-war-to-the-united-states\/\">series of disclosures<\/a> of emails and documents belonging mostly to Democratic officials, but <a href=\"http:\/\/foreignpolicy.com\/2016\/08\/12\/russian-hacking-campaign-hits-republicans-too\/\">also to Republicans<\/a>. Security researchers believe those breaches\u00a0were perpetrated by agents thought\u00a0to be acting on behalf of Moscow.<\/p>\n<p>The NSA did not answer <span class=\"fp-red\">Foreign Policy<\/span>\u2019s questions about the alleged breach on Monday. But if someone has managed to penetrate the American signals intelligence agency and post its code online for the world to see \u2014 and purchase \u2014 it would constitute a historic black eye for the agency.<\/p>\n<p>\u201cIt\u2019s at minimum very interesting; at maximum, hugely damaging,\u201d said Dave Aitel, a former NSA research scientist and now the CEO of the security firm Immunity. \u201cIt\u2019ll blow some operations if those haven\u2019t already been blown.\u201d<\/p>\n<p>The files posted over the weekend include two sets of files. The hackers have made one set available for free. The other remains encrypted and is the subject of an online auction, payable in bitcoin, the cryptocurrency. That set includes, according to the so-called Shadow Brokers, \u201cthe best files.\u201d If they receive at least 1 million bitcoin \u2014 the equivalent of at least $550 million \u2014 they will post more documents and make them available for free.<\/p>\n<p>The set of files available for free contains a series of tools for penetrating network gear made by Cisco, Juniper, and other major firms. Targeting such gear, which includes things like routers and firewalls, <a href=\"http:\/\/www.infoworld.com\/article\/2608141\/internet-privacy\/snowden--the-nsa-planted-backdoors-in-cisco-products.html\" target=\"_blank\">is a known tactic<\/a> of Western intelligence agencies like the NSA, and was documented in the Edward Snowden files. Some code words referenced in the material Monday \u2014 <a href=\"http:\/\/snowdenarchive.cjfe.org\/greenstone\/cgi-bin\/library.cgi?e=q-00100-00---off-0snowden1--00-2----0-10-0---0---0direct-10-and%2cand%2cand-TE%2cTT%2cDE%2cSU--4--jetplow%2c%2c%2c-----0-1l--00-en-50---50-about-TE%3a%28jetplow%29--01-3-1-00-00--4--0--0-0-01-10-0utfZz-8-00&amp;amp;a=q&amp;r=1&amp;hs=1&amp;k=0&amp;s=0&amp;fqa=0&amp;fqv=bananaglee,,,&amp;fqf=TE,TT,DE,SU&amp;fqk=&amp;fqs=&amp;fqc=and,and,and&amp;fqaf=\" target=\"_blank\">BANANAGLEE<\/a> and <a href=\"http:\/\/snowdenarchive.cjfe.org\/greenstone\/cgi-bin\/library.cgi?e=q-00100-00---off-0snowden1--00-2----0-10-0---0---0direct-10-and%2cand%2cand-TE%2cTT%2cDE%2cSU--4--bananaglee%2c%2c%2c-----0-1l--00-en-50---50-about-TE%3a%28bananaglee%29--01-3-1-00-00--4--0--0-0-01-10-0utfZz-8-00&amp;amp;a=q&amp;r=1&amp;hs=1&amp;k=0&amp;s=0&amp;fqa=0&amp;fqv=jetplow,,,&amp;fqf=TE,TT,DE,SU&amp;fqk=&amp;fqs=&amp;fqc=and,and,and&amp;fqaf=\" target=\"_blank\">JETPLOW<\/a> \u2014 match those that have appeared in documents leaked by Snowden. Security researchers analyzing the code posted Monday <a href=\"http:\/\/medium.com\/@msuiche\/shadow-brokers-nsa-exploits-of-the-week-3f7e17bdc216#.v5mpoz3ri\" target=\"_blank\">say<\/a> it is functional and includes computer codes for carrying out espionage.<\/p>\n<p>The Equation Group is a collection of hackers whose activities <a href=\"http:\/\/www.kaspersky.com\/about\/news\/virus\/2015\/equation-group-the-crown-creator-of-cyber-espionage\" target=\"_blank\">were first documented<\/a> by Kaspersky Lab, a Russian cybersecurity firm, last year. Kaspersky connected the activities of the Equation Group, which it called \u201ca threat actor that surpasses anything known in terms of complexity and sophistication of techniques,\u201d to operations carried out by U.S. intelligence. While Kaspersky did not outright attribute the Equation Group to\u00a0the NSA, security researchers say in private that they believe it is a project of the American signals intelligence unit.<\/p>\n<p>If the leak is a genuine sample of NSA code \u2014 which, so far, researchers say is the case \u2014 then this month\u2019s season of information warfare has taken yet another bizarre turn. In the span of several weeks, Russian hackers have posted hacked emails and other documents on a mysterious site known as DCLeaks.com. Those same hackers have infiltrated the Democratic National Committee, and then likely fed documents exfiltrated from its servers to WikiLeaks. Those documents ignited a major political firestorm within the DNC on the eve of the party\u2019s presidential nominating convention, led to the resignation of party chief Debbie Wasserman Schultz, and prompted the Clinton campaign to argue that Moscow was intervening in the election in favor of Moscow-friendly Republican nominee Donald Trump.<\/p>\n<p>To muddy the waters, a persona calling itself Guccifer 2.0 \u2014 and which intelligence agencies and security researchers say is a Russian invention \u2014 has surfaced to take credit for the attack on the DNC and other political institutions. On Monday, he <a href=\"http:\/\/guccifer2.wordpress.com\/2016\/08\/15\/dccc-internal-docs-on-primaries-in-florida\/\" target=\"_blank\">posted<\/a> his latest set of pilfered documents: internal assessments of Florida congressional races obtained from the Democratic Congressional Campaign Committee.<\/p>\n<p>In a Twitter message to <span class=\"fp-red\">Foreign Policy<\/span>, Guccifer 2.0 called the Shadow Broker dump \u201cbullshit\u201d but wouldn\u2019t elaborate on what he meant. \u201cThe hacking world operates differently,\u201d he said.<\/p>\n<p>So is Russia also responsible for this alleged penetration of the NSA? Aitel believes that it is, and that we are witnessing a small part of the shadow war playing out between Washington and Moscow.<\/p>\n<p>On the heels of the DNC breach, a chorus of American politicians has called for the United States to respond, and Aitel believes that the posting of NSA may be an escalating conflict in cyberspace between the two powers.<\/p>\n<p>In a note along with the files, the Shadow Brokers come across as merry pranksters with a distinctly populist set of political ideas. \u201cWe follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.\u201d<\/p>\n<p>The group delivered a message to what it called \u201cwealthy elites\u201d and assailed the integrity of elections. \u201cElites is making laws protect self and friends, lie and fuck other peoples,\u201d they wrote in idiosyncratic English. \u201cThen Elites runs for president. Why run for president when already control country like dictatorship?\u201d<\/p>\n<p>\u201cWe want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites,\u201d the group added. \u201cYour wealth and control depends on electronic data.\u201d<\/p>\n<p>A penetration of an NSA tool of this kind, which Aitel said is similar to what an NSA agent would see when carrying out cyber operations, would probably require the tools of hackers working on behalf of nation-state because the agency is typically careful in hiding its tools and using computer defenses.<\/p>\n<p>The goal of the operation remains something of a mystery. The files appear to be from late 2013 \u2014 after the Snowden revelations \u2014 in which case whoever burned this NSA operation has been sitting on explosive government files for some three years. Why post these documents now? And to what end?<\/p>\n<p class=\"last\">Those questions are probably being debated in the White House, where a spokesman declined to answer questions on what may go down in history as a landmark day in the history of cyberwarfare.<\/p>\n<p class=\"last\">___<br \/>\n<a href=\"http:\/\/foreignpolicy.com\/2016\/08\/15\/shadow-brokers-claim-to-be-selling-nsa-malware-in-what-could-be-historic-hack\/\">http:\/\/foreignpolicy.com\/2016\/08\/15\/shadow-brokers-claim-to-be-selling-nsa-malware-in-what-could-be-historic-hack\/<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u2018Shadow Brokers\u2019 Claim to be Selling NSA Malware, in What Could Be Historic Hack Programs posted online allow espionage on network devices.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-46277","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/46277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46277"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/46277\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=46277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=46277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}