Blog

Hacking Group Claims to Have Stolen NSA Cyber Weapons

b2ap3_thumbnail_nsa_malware_400.jpgEvery security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.


Of course, there’s no guaranteeing that the tools obtained are actually tools used by the NSA. Unfortunately, there could be a hint of truth to these claims. After all, security researchers have found that some of the sample files provided by the hackers do contain some actual, legitimate exploits. Some of them even include exploits for widely-used security services and firewall solutions, which could be dangerous if acquired by hackers who are more interested in using them than making a profit.

The hackers who obtained these exploits claim to have stolen them from the Equation Group, a cyber-espionage group that reportedly may be tied to the NSA. The Equation Group is known as the hackers who, according to Kaspersky Lab, probably helped to develop the Stuxnet computer worm, and are known to deal with advanced malware. Apparently, a group of hackers, known as the "Shadow Brokers", are looking to auction off these cyber weapons to the highest bidder.

Specifically, the exploits on sale are designed to target firewall technology from big names such as Cisco, Juniper, Fortinet, and a Chinese brand called Topsec. Security professionals are calling the code legitimate, and one even managed to confirm that one of the exploits has an IP address that’s registered to the United States Department of Defense. It’s thought that the exploits were found on an infrastructure they were monitoring, and thus gave the hackers exactly what they needed to turn a profit.

The hackers are currently offering the exploits on the black market in exchange for Bitcoin, but there’s no guarantee that they will make good on their promise and hand them over. Some professionals even believe that it’s an elaborate scam. The NSA hasn’t confirmed any affiliation with the Equation Group or the exploits stolen, so who knows if the Shadow Brokers are telling the truth about any of this?

The Shadow Brokers claim that they will publicly expose these exploits if they can get 1 million Bitcoins. Can you imagine the sort of chaos that could be unleashed should they make good on their threat to reveal this information? Hackers would have government-grade espionage technology at their fingertips; and until patches are released for the exploits, hackers could mercilessly assault systems that fail to keep themselves safe, and even those that are.

How secure are your mission-critical files? To find out, contact White Mountain IT Services at 603-889-0800.

Related Posts

Starting in 2008, Verizon has produced a report outlining the cybersecurity incident trends that the previous year demonstrated. In doing so, they have provided a resource that gives businesses greater insights into where their cybersecurity efforts ...
A security audit is designed to test the overall integrity of your business when it comes to its IT security. In today’s environment, businesses need to have strengthened fortifications in place to protect themselves from cyberthreats, and these fort...
Conferencing has been an important tool for businesses as stay-at-home orders have moved their operations out of the office and into worker’s homes. While there are dozens of video conferencing solutions on the market, businesses should consider secu...
All types of businesses use cloud resources as a part of their IT infrastructure. It allows them to turn what was once a major capital expenditure into a controllable operating cost; and, it does it while offering solutions to almost any business pro...

Quick question. If I were to ask you, on the spot, to tell me where all of your company data is, right this moment, could you tell me with absolute confidence? What if I could prove you wrong?

The growing popularity of ransomware has been disconcerting to many IT professionals, particularly due to the different tactics that this malware variant has been spotted utilizing. In order to protect your business from these attacks, it helps to kn...
Businesses are looking to technology more than ever in a constant attempt to improve productivity and efficiency. One problem that some businesses face is that their staff isn’t exactly technologically savvy, making them difficult to communicate with...
Manufacturers are interesting businesses. Not only do they depend on manpower and technology to produce goods, they also rely on IT to power processes, manage their supply chain, and enhance organizational efficiency. With October being Cybersecurity...
With cybersecurity talent at such a critical shortage, data breaches that expose millions of people’s sensitive information are routine occurrences. It is one of the biggest problems that the modern business faces. Since shortages have businesses of ...
It’s not uncommon where a situation arises and you will find yourself working from home. To make this work, it is important that you keep a few additional issues in mind so that you can make the most of it. We have put together a few simple best prac...
Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity p...
Nearly everyone uses Google in some way or another. The search engine is, by far, the most common way people get answers and find content online. The margins aren’t even close, either. Currently, Google handles about 90% of search queries, while the ...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  For locations outside of our service area, we will manage a local vendor to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions