Hacking Group Claims to Have Stolen NSA Cyber Weapons

b2ap3_thumbnail_nsa_malware_400.jpgEvery security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Of course, there’s no guaranteeing that the tools obtained are actually tools used by the NSA. Unfortunately, there could be a hint of truth to these claims. After all, security researchers have found that some of the sample files provided by the hackers do contain some actual, legitimate exploits. Some of them even include exploits for widely-used security services and firewall solutions, which could be dangerous if acquired by hackers who are more interested in using them than making a profit.

The hackers who obtained these exploits claim to have stolen them from the Equation Group, a cyber-espionage group that reportedly may be tied to the NSA. The Equation Group is known as the hackers who, according to Kaspersky Lab, probably helped to develop the Stuxnet computer worm, and are known to deal with advanced malware. Apparently, a group of hackers, known as the "Shadow Brokers", are looking to auction off these cyber weapons to the highest bidder.

Specifically, the exploits on sale are designed to target firewall technology from big names such as Cisco, Juniper, Fortinet, and a Chinese brand called Topsec. Security professionals are calling the code legitimate, and one even managed to confirm that one of the exploits has an IP address that’s registered to the United States Department of Defense. It’s thought that the exploits were found on an infrastructure they were monitoring, and thus gave the hackers exactly what they needed to turn a profit.

The hackers are currently offering the exploits on the black market in exchange for Bitcoin, but there’s no guarantee that they will make good on their promise and hand them over. Some professionals even believe that it’s an elaborate scam. The NSA hasn’t confirmed any affiliation with the Equation Group or the exploits stolen, so who knows if the Shadow Brokers are telling the truth about any of this?

The Shadow Brokers claim that they will publicly expose these exploits if they can get 1 million Bitcoins. Can you imagine the sort of chaos that could be unleashed should they make good on their threat to reveal this information? Hackers would have government-grade espionage technology at their fingertips; and until patches are released for the exploits, hackers could mercilessly assault systems that fail to keep themselves safe, and even those that are.

How secure are your mission-critical files? To find out, contact White Mountain IT Services at 603-889-0800.

Related Articles

  • Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
  • Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...
  • Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
  • Here’s How Companies Struggle with IT Security No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security. Password...
  • Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
  • A Brief Overview of Network Security The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multipl...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions