It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
REPORT ‘Shadow Brokers’ Claim to be Selling NSA Malware, in What Could Be Historic Hack
A mysterious online group calling itself “The Shadow Brokers” is claiming to have penetrated the National Security Agency, stolen some of its malware, and is auctioning off the files to the highest bidder.
The authenticity of the files cannot be confirmed but appear to be legitimate, according to security researchers who have studied their content. Their release comes on the heels of a series of disclosures of emails and documents belonging mostly to Democratic officials, but also to Republicans.
“It’s at minimum very interesting; at maximum, hugely damaging,” said Dave Aitel, a former NSA research scientist and now the CEO of the security firm Immunity. “It’ll blow some operations if those haven’t already been blown.”
The files posted over the weekend include two sets of files. The hackers have made one set available for free. The other remains encrypted and is the subject of an online auction, payable in bitcoin, the cryptocurrency. That set includes, according to the so-called Shadow Brokers, “the best files.” If they receive at least 1 million bitcoin — the equivalent of at least $550 million — they will post more documents and make them available for free.
The set of files available for free contains a series of tools for penetrating network gear made by Cisco, Juniper, and other major firms. Targeting such gear, which includes things like routers and firewalls, is a known tactic of Western intelligence agencies like the NSA, and was documented in the Edward Snowden files. Some code words referenced in the material Monday — BANANAGLEE and JETPLOW — match those that have appeared in documents leaked by Snowden. Security researchers analyzing the code posted Monday say it is functional and includes computer codes for carrying out espionage.
It's fine, the rule is one in BAN, one in another forum is not considered a dupe thread.
The goal of the operation remains something of a mystery. The files appear to be from late 2013 — after the Snowden revelations — in which case whoever burned this NSA operation has been sitting on explosive government files for some three years. Why post these documents now? And to what end? Those questions are probably being debated in the White House, where a spokesman declined to answer questions on what may go down in history as a landmark day in the history of cyberwarfare.
Here are some code names that I extracted from the free files offered as a teaser on the Shadow Broker's dump, the main targets appear to be Fortinet, TopSec, Cisco & Juniper firewalls.
Most of the code appears to be batch scripts and poorly coded python scripts, and seems to be a Toolkit against firewalls. Nonetheless, this appears to be legitimate code.
...
Banana Glee is particularly interesting because it allows references to the JETPLOW explanation from the 2014 NSA’s Tailored Access Operations (TAO) catalog: [link removed by jadedANDcynical]. This lends much credence that this hack is legitimate.
originally posted by: burntheships
a reply to: IAMTAT
It appears to be a trap.
Jaded touched on it there, a honey pot.
My guess is this was a lure.
CANCUN, Mexico — In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific conference they attended in Houston. The scientists didn't know it then, but the disc also delivered a malicious payload developed by a highly advanced hacking operation that had been active since at least 2001. The CD, it seems, was tampered with on its way through the mail.
It wasn't the first time the operators—dubbed the "Equation Group" by researchers from Moscow-based Kaspersky Lab—had secretly intercepted a package in transit, booby-trapped its contents, and sent it to its intended destination. In 2002 or 2003, Equation Group members did something similar with an Oracle database installation CD in order to infect a different target with malware from the group's extensive library. (Kaspersky settled on the name Equation Group because of members' strong affinity for encryption algorithms, advanced obfuscation methods, and sophisticated techniques.)
Kaspersky researchers have documented 500 infections by Equation Group in at least 42 countries, with Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali topping the list.
Second, a highly advanced keylogger in the Equation Group library refers to itself as "Grok" in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined "How the NSA Plans to Infect 'Millions' of Computers with Malware." The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
...Besides sharing the unconventional spelling "strait," Snowden-leaked documents note that STRAITBIZARRE could be turned into a disposable "shooter." In addition, the codename FOXACID belonged to the same NSA malware framework as the Grok keylogger.
For clarification, yes there are actual exploits in the dump, with a 2013 timestamp on files. We do not know if they are working as nobody as tried them, but they are actual exploits and not only references.
originally posted by: IAMTAT
Think of what it would take to successfully hack the NSA.
I think the term "Shadow Brokers" is an apt one.
This is something much bigger and more powerfully advanced than a Snowden or an Assange.
originally posted by: interupt42
originally posted by: IAMTAT
Think of what it would take to successfully hack the NSA.
I think the term "Shadow Brokers" is an apt one.
This is something much bigger and more powerfully advanced than a Snowden or an Assange.
Me thinks their might be some small but key rogue agents helping to expose the corrupted system versus standalone hackings.