Knowledge (XXG)

The Shadow Brokers

Source 📝

223:(NSA), was the lead suspect. Martin had worked with the NSA's Tailored Access Operations from 2012 to 2015 in a support role. He pleaded guilty to retaining national defense information in 2019, but it is not clear whether the Shadow Brokers obtained their material from him. The Shadow Brokers continued posting messages that were cryptographically-signed and were interviewed by media while Martin was detained. 259:. As US intelligence agencies were contemplating counter-attacks, the Shadow Brokers code release was to be seen as a warning: "Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in 76:
quoted the following description of that character: "The Shadow Broker is an individual at the head of an expansive organization which trades in information, always selling to the highest bidder. The Shadow Broker appears to be highly competent at its trade: all secrets that are bought and sold never
113:
On October 31, 2016, The Shadow Brokers published a list of servers supposedly compromised by the Equation Group, as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOICSURGEON) also used by the threat actor.
242:
indicates Russian responsibility" and that the leak "is likely a warning that someone can prove responsibility for any attacks that originated from this malware server" summarizing that it looks like "somebody sending a message that an escalation in the attribution game could get messy fast".
121:
account used by The Shadow Brokers posted a new update. The post revealed the password to encrypted files released the previous year, which allegedly had more NSA hacking tools. This posting explicitly stated that the post was partially in response to President Trump's
268:
In 2019, David Aitel, a computer scientist formerly employed by the NSA, summarized the situation with: "I don't know if anybody knows other than the Russians. And we don't even know if it's the Russians. We don't know at this point; anything could be true."
622: 144:
Some of the exploits targeting the Windows operating system had been patched in a Microsoft Security Bulletin on March 14, 2017, one month before the leak occurred. Some speculated that Microsoft may have been tipped off about the release of the exploits.
623:"'Shadow Brokers' Reveal List Of Servers Hacked By The NSA; China, Japan, And Korea The Top 3 Targeted Countries; 49 Total Countries, Including: China, Japan, Germany, Korea, India, Italy, Mexico, Spain, Taiwan, & Russia" 403: 77:
allow one customer of the Broker to gain a significant advantage, forcing the customers to continue trading information to avoid becoming disadvantaged, allowing the Broker to remain in business."
1583: 141:
The leak was suggested to be the "...most damaging release yet" and CNN quoted Matthew Hickey saying, "This is quite possibly the most damaging thing I've seen in the last several years".
1603: 1237: 134:
On April 14, 2017, The Shadow Brokers released, amongst other things, the tools and exploits codenamed: DANDERSPRITZ, ODDJOB, FUZZBUNCH, DARKPULSAR, ETERNALSYNERGY, ETERNALROMANCE,
1000: 1269: 1174: 595: 181:. This allows for the installation of the PEDDLECHEAP payload which would then be accessed by the attacker using the DanderSpritz Listening Post (LP) software. 524: 1755: 1295: 726: 1573: 905: 252: 106:
repository containing references and instructions for obtaining and decrypting the content of a file supposedly containing tools and exploits used by the
1517: 471: 290: 443: 1061: 803: 701: 879: 580: 1563: 1332: 1687: 1229: 510: 672: 2101: 1568: 2235: 2217: 1718: 1496: 1262: 853: 2241: 1767: 1728: 1363: 974: 1542: 2301: 2247: 1822: 1713: 1127:"This leak is likely a warning that someone can prove US responsibility for any attacks that originated from this malware server" 346: 54:
products. The Shadow Brokers originally attributed the leaks to the Equation Group threat actor, who have been tied to the NSA's
828: 1649: 1486: 1388: 295: 1708: 1481: 94:
started at least in the beginning of August, and that the initial publication occurred August 13, 2016 with a Tweet from a
2748: 1588: 1300: 1290: 1255: 1149:"TL;DR: This leak looks like a somebody sending a message that an escalation in the attribution game could get messy fast" 1080: 778: 2462: 1852: 1639: 1578: 1537: 1435: 1029: 1957: 1692: 1455: 949: 123: 159:
Over 200,000 machines were infected with tools from this leak within the first two weeks, and in May 2017, the major
375: 2646: 1987: 1842: 1634: 1527: 1471: 562: 202: 160: 55: 30:
who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several
1099:"Circumstantial evidence and conventional wisdom indicates Russian responsibility. Here's why that is significant" 2127: 2096: 1723: 168: 2265: 1832: 1750: 1656: 1629: 1202: 1043: 220: 39: 2421: 2085: 1558: 1491: 1337: 2738: 2295: 2151: 1982: 1644: 542: 2743: 2436: 2271: 2055: 1419: 920: 649: 2199: 2080: 1792: 1501: 1450: 1445: 212: 178: 164: 68: 43: 31: 424: 2698: 2570: 1598: 1414: 239: 216: 207: 291:"'President Trump what the f**k are you doing' say Shadow Brokers and dump more NSA hacking tools" 2708: 2703: 2600: 2229: 1918: 1608: 1409: 925: 247: 66:
Several news sources noted that the group's name was likely in reference to a character from the
47: 42:(NSA) of the United States. Specifically, these exploits and vulnerabilities targeted enterprise 110:. The initial response to the publication was met with some uncertainty about its authenticity. 2713: 2595: 2565: 2169: 2025: 1383: 1347: 2641: 2493: 2416: 2065: 2002: 1877: 1326: 1233: 1179: 600: 118: 2651: 2626: 2590: 2518: 2431: 2426: 2070: 1862: 1772: 1476: 1148: 1126: 1098: 2390: 2385: 2075: 2060: 2050: 2045: 1977: 1952: 1947: 1942: 1887: 1342: 1206: 256: 231: 107: 35: 496: 2732: 2513: 1972: 1931: 1927: 1923: 880:"Leaked NSA tools, now infecting over 200,000 machines, will be weaponized for years" 547: 380: 261: 194: 91: 2457: 2411: 2211: 2175: 2030: 2020: 1913: 1908: 1903: 1777: 1593: 1522: 448: 175: 99: 27: 1175:"Edward Snowden: Russia might have leaked alleged NSA cyberweapons as a 'warning'" 596:"'Shadow Brokers' claim to have hacked an NSA-linked elite computer security unit" 317: 2693: 2683: 2631: 2539: 2483: 2395: 2344: 2205: 2035: 1762: 1393: 201:
speculated that an insider, "possibly someone assigned to the highly sensitive
198: 154: 135: 73: 90:
While the exact date is unclear, reports suggested that the preparation of the
2636: 2621: 2549: 2339: 2289: 2193: 2145: 2121: 2109: 1967: 1892: 1882: 1872: 1857: 1817: 1742: 1373: 727:"Latest Shadow Brokers dump — owning SWIFT Alliance Access, Cisco and Windows" 566: 525:"The 'Shadow Brokers' NSA theft puts the Snowden leaks to shame - ExtremeTech" 1062:"Hints suggest an insider helped the NSA "Equation Group" hacking tools leak" 752: 2667: 2544: 2508: 2498: 2370: 2187: 1937: 1867: 1807: 1368: 444:"NSA-leaking Shadow Brokers lob Molotov cocktail before exiting world stage" 51: 2575: 2503: 2488: 2307: 2283: 2157: 2139: 2040: 1962: 1797: 1782: 1682: 1661: 1440: 950:"zerosum0x0: DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis" 322: 167:(SMB) to spread itself. The exploit was also used to help carry out the 2605: 2478: 2441: 2375: 2354: 2324: 2277: 2259: 2181: 2115: 1897: 1812: 1802: 1787: 1247: 1103: 235: 95: 702:"NSA-leaking Shadow Brokers just dumped its most damaging release yet" 581:"The Shadow Brokers: Lifting the Shadows of the NSA's Equation Group?" 2688: 2580: 2534: 2349: 2163: 2133: 2012: 1997: 1827: 1666: 1378: 906:"An NSA-derived ransomware worm is shutting down computers worldwide" 543:"Shadow Brokers: Hackers Claim to have Breached NSA's Equation Group" 103: 472:"Confirmed: hacking tool leak came from "omnipotent" NSA-tied group" 265:
where the head of a favorite horse is left in a bed, as a warning."
347:"Equation = NSA? Researchers Uncloak Huge 'American Cyber Arsenal'" 2313: 2253: 2223: 1532: 174:
ETERNALBLUE contains kernel shellcode to load the non-persistent
2585: 2380: 1624: 919:
Perlroth, Nicole; Scott, Mark; Frenkel, Sheera (June 27, 2017).
673:"They're Back: The Shadow Brokers Release More Alleged Exploits" 511:"Group claims to hack NSA-tied hackers, posts exploits as proof" 219:
accused of stealing approximately 50 terabytes of data from the
1251: 1201:
Eric Lipton; David E. Sanger; Scott Shane (December 13, 2016).
428: 1230:"Mystery of NSA leak lingers as stolen document case winds up" 854:"Microsoft says it already patched 'Shadow Brokers' NSA leaks" 1203:"The Perfect Weapon: How Russian Cyberpower Invaded the U.S." 804:"Microsoft says users are protected from alleged NSA malware" 1044:"Commentary: Evidence points to another Snowden at the NSA" 1564:
Hollywood Presbyterian Medical Center ransomware incident
1081:"NSA Exploit Peddlers The Shadow Brokers Call It Quits" 921:"Cyberattack Hits Ukraine Then Spreads Internationally" 425:"Equation Group - Cyber Weapons Auction - Pastebin.com" 318:"'NSA malware' released by Shadow Brokers hacker group" 404:"Powerful NSA hacking tools have been revealed online" 238:
on August 16, 2016 that "circumstantial evidence and
779:"NSA's powerful Windows hacking tools leaked online" 2676: 2660: 2614: 2558: 2527: 2471: 2450: 2404: 2363: 2332: 2323: 2094: 2011: 1841: 1741: 1701: 1675: 1617: 1551: 1510: 1464: 1428: 1402: 1356: 1319: 1312: 376:"The NSA Leak is Real, Snowden Documents Confirm" 38:" who are widely suspected to be a branch of the 185:Speculations and theories on motive and identity 1604:Russian interference in the 2016 U.S. elections 696: 694: 419: 417: 1263: 1228:Abdollah, Tami; Tucker, Eric (July 6, 2019). 369: 367: 205:", stole the hacking tools. In October 2016, 8: 1574:Democratic National Committee cyber attacks 1001:"DanderSpritz/PeddleCheap Traffic Analysis" 253:Democratic National Committee cyber attacks 2329: 1518:Office of Personnel Management data breach 1316: 1270: 1256: 1248: 829:"Protecting customers and evaluating risk" 563:"Shadow Brokers: NSA Exploits of the Week" 126:, which was also used by Russian forces. 278: 251:put the incident in the context of the 98:account "@shadowbrokerss" announcing a 975:"Shining Light on The Shadow Brokers" 7: 1030:"Shadow Brokers: The insider theory" 497:"The Equation giveaway - Securelist" 402:Nakashima, Ellen (August 16, 2016). 284: 282: 1569:Commission on Elections data breach 1240:from the original on July 6, 2019. 648:theshadowbrokers (April 8, 2017). 14: 1729:Jeff Bezos phone hacking incident 777:Larson, Selena (April 14, 2017). 427:. August 16, 2016. Archived from 2302:Microarchitectural Data Sampling 1538:Ukrainian Power Grid Cyberattack 1446:Cyberterrorism attack of June 25 1079:Cox, Joseph (January 12, 2017). 289:Ghosh, Agamoni (April 9, 2017). 163:used the ETERNALBLUE exploit on 124:attack against a Syrian airfield 1650:2017 Ukraine ransomware attacks 1487:2014 JPMorgan Chase data breach 470:Goodin, Dan (August 16, 2016). 442:Dan Goodin (January 12, 2017). 296:International Business Times UK 138:, EXPLODINGCAN and EWOKFRENZY. 1482:2014 celebrity nude photo leak 1173:Price, Rob (August 16, 2016). 374:Sam Biddle (August 19, 2016). 1: 1719:Bulgarian revenue agency hack 1497:Russian hacker password theft 671:Cox, Joseph (April 8, 2017). 594:Rob Price (August 15, 2016). 1853:Bangladesh Black Hat Hackers 1329:(publication of 2009 events) 948:Sum, Zero (April 21, 2017). 1714:Baltimore ransomware attack 2765: 1988:Tailored Access Operations 1635:WannaCry ransomware attack 1528:Ashley Madison data breach 1472:Anthem medical data breach 1389:PlayStation network outage 215:, a former contractor for 203:Tailored Access Operations 161:WannaCry ransomware attack 152: 130:April 14 hacking tool leak 56:Tailored Access Operations 1724:WhatsApp snooping scandal 1589:Indian Bank data breaches 1283: 169:2017 NotPetya cyberattack 2266:Speculative Store Bypass 1833:Ukrainian Cyber Alliance 1630:2017 Macron e-mail leaks 650:"Don't Forget Your Base" 227:Theory on ties to Russia 221:National Security Agency 40:National Security Agency 1640:Westminster data breach 1559:Bangladesh Bank robbery 1502:2014 Yahoo! data breach 1492:2014 Sony Pictures hack 1451:2013 Yahoo! data breach 1436:South Korea cyberattack 1338:Operation Olympic Games 1333:Australian cyberattacks 1983:Syrian Electronic Army 1693:SingHealth data breach 1456:Singapore cyberattacks 1394:RSA SecurID compromise 117:On April 8, 2017, the 2272:Lazy FP state restore 2056:Kristoffer von Hassel 1709:Sri Lanka cyberattack 1579:Vietnam Airport Hacks 1420:Operation High Roller 979:The State of Security 2749:Hacking in the 2010s 2218:Silent Bob is Silent 1278:Hacking in the 2010s 213:Harold T. Martin III 165:Server Message Block 86:Equation Group leaks 2152:SS7 vulnerabilities 1688:Atlanta cyberattack 1657:Equifax data breach 1415:Stratfor email leak 1364:Canadian government 1343:Operation ShadowNet 431:on August 15, 2016. 408:The Washington Post 255:and hacking of the 240:conventional wisdom 217:Booz Allen Hamilton 208:The Washington Post 72:video game series. 2601:Petya and NotPetya 2230:ROCA vulnerability 1993:The Shadow Brokers 1919:Iranian Cyber Army 1845:persistent threats 1645:Petya and NotPetya 1609:2016 Bitfinex hack 1584:DCCC cyber attacks 1543:SWIFT banking hack 1068:. August 22, 2016. 1050:. August 23, 2016. 1032:. August 17, 2016. 1010:. February 6, 2018 926:The New York Times 679:. Vice Motherboard 629:. November 1, 2016 583:. August 15, 2016. 569:. August 15, 2016. 551:. August 15, 2016. 531:. August 19, 2016. 513:. August 16, 2016. 499:. August 16, 2016. 345:Brewster, Thomas. 248:The New York Times 190:NSA insider threat 171:on June 27, 2017. 48:antivirus software 20:The Shadow Brokers 2726: 2725: 2722: 2721: 2714:ZeroAccess botnet 2026:Mustafa Al-Bassam 1793:New World Hackers 1756:associated events 1737: 1736: 1533:VTech data breach 1384:Operation AntiSec 1348:Operation Payback 1307: 1306: 1129:. August 16, 2016 1107:. August 16, 2016 32:zero-day exploits 2756: 2330: 2003:Yemen Cyber Army 1327:Operation Aurora 1317: 1286: 1285: 1272: 1265: 1258: 1249: 1242: 1241: 1234:Associated Press 1225: 1219: 1218: 1216: 1214: 1198: 1192: 1191: 1189: 1187: 1180:Business Insider 1170: 1164: 1163: 1161: 1159: 1145: 1139: 1138: 1136: 1134: 1123: 1117: 1116: 1114: 1112: 1095: 1089: 1088: 1076: 1070: 1069: 1058: 1052: 1051: 1040: 1034: 1033: 1026: 1020: 1019: 1017: 1015: 1005: 997: 991: 990: 988: 986: 971: 965: 964: 962: 960: 945: 939: 938: 936: 934: 916: 910: 909: 902: 896: 895: 893: 891: 886:. April 24, 2017 876: 870: 869: 867: 865: 860:. April 15, 2017 850: 844: 843: 841: 839: 825: 819: 818: 816: 814: 800: 794: 793: 791: 789: 774: 768: 767: 765: 763: 749: 743: 742: 740: 738: 733:. April 14, 2017 723: 717: 716: 714: 712: 698: 689: 688: 686: 684: 668: 662: 661: 659: 657: 645: 639: 638: 636: 634: 627:Fortuna's Corner 619: 613: 612: 610: 608: 601:Business Insider 591: 585: 584: 577: 571: 570: 559: 553: 552: 539: 533: 532: 521: 515: 514: 507: 501: 500: 493: 487: 486: 484: 482: 467: 461: 460: 458: 456: 439: 433: 432: 421: 412: 411: 399: 393: 392: 390: 388: 371: 362: 361: 359: 357: 342: 336: 335: 333: 331: 326:. April 10, 2017 314: 308: 307: 305: 303: 286: 2764: 2763: 2759: 2758: 2757: 2755: 2754: 2753: 2729: 2728: 2727: 2718: 2672: 2656: 2610: 2554: 2523: 2467: 2446: 2400: 2359: 2319: 2099: 2097:vulnerabilities 2090: 2007: 1900:(confederation) 1863:Charming Kitten 1844: 1837: 1773:Goatse Security 1733: 1697: 1671: 1662:Deloitte breach 1613: 1599:Dyn cyberattack 1547: 1506: 1477:Operation Tovar 1460: 1424: 1398: 1352: 1313:Major incidents 1308: 1279: 1276: 1246: 1245: 1227: 1226: 1222: 1212: 1210: 1200: 1199: 1195: 1185: 1183: 1172: 1171: 1167: 1157: 1155: 1147: 1146: 1142: 1132: 1130: 1125: 1124: 1120: 1110: 1108: 1097: 1096: 1092: 1078: 1077: 1073: 1060: 1059: 1055: 1042: 1041: 1037: 1028: 1027: 1023: 1013: 1011: 1003: 999: 998: 994: 984: 982: 973: 972: 968: 958: 956: 947: 946: 942: 932: 930: 918: 917: 913: 908:. May 12, 2017. 904: 903: 899: 889: 887: 878: 877: 873: 863: 861: 852: 851: 847: 837: 835: 827: 826: 822: 812: 810: 802: 801: 797: 787: 785: 776: 775: 771: 761: 759: 751: 750: 746: 736: 734: 725: 724: 720: 710: 708: 700: 699: 692: 682: 680: 670: 669: 665: 655: 653: 647: 646: 642: 632: 630: 621: 620: 616: 606: 604: 593: 592: 588: 579: 578: 574: 561: 560: 556: 541: 540: 536: 523: 522: 518: 509: 508: 504: 495: 494: 490: 480: 478: 469: 468: 464: 454: 452: 441: 440: 436: 423: 422: 415: 401: 400: 396: 386: 384: 373: 372: 365: 355: 353: 344: 343: 339: 329: 327: 316: 315: 311: 301: 299: 288: 287: 280: 275: 229: 192: 187: 157: 151: 132: 88: 83: 64: 17: 12: 11: 5: 2762: 2760: 2752: 2751: 2746: 2741: 2731: 2730: 2724: 2723: 2720: 2719: 2717: 2716: 2711: 2706: 2701: 2696: 2691: 2686: 2680: 2678: 2674: 2673: 2671: 2670: 2664: 2662: 2658: 2657: 2655: 2654: 2649: 2644: 2639: 2634: 2629: 2624: 2618: 2616: 2612: 2611: 2609: 2608: 2603: 2598: 2593: 2588: 2583: 2578: 2573: 2568: 2562: 2560: 2556: 2555: 2553: 2552: 2547: 2542: 2537: 2531: 2529: 2525: 2524: 2522: 2521: 2516: 2511: 2506: 2501: 2496: 2491: 2486: 2484:Black Energy 3 2481: 2475: 2473: 2469: 2468: 2466: 2465: 2460: 2454: 2452: 2448: 2447: 2445: 2444: 2439: 2434: 2429: 2424: 2419: 2414: 2408: 2406: 2402: 2401: 2399: 2398: 2393: 2391:Metulji botnet 2388: 2383: 2378: 2373: 2367: 2365: 2361: 2360: 2358: 2357: 2352: 2347: 2345:Black Energy 2 2342: 2336: 2334: 2327: 2321: 2320: 2318: 2317: 2311: 2305: 2299: 2293: 2287: 2281: 2275: 2269: 2263: 2257: 2251: 2245: 2239: 2233: 2227: 2221: 2215: 2209: 2203: 2200:Broadcom Wi-Fi 2197: 2191: 2185: 2179: 2173: 2167: 2161: 2155: 2149: 2143: 2137: 2131: 2125: 2119: 2113: 2106: 2104: 2092: 2091: 2089: 2088: 2083: 2078: 2073: 2068: 2063: 2061:Junaid Hussain 2058: 2053: 2051:Jeremy Hammond 2048: 2046:Elliott Gunton 2043: 2038: 2033: 2028: 2023: 2017: 2015: 2009: 2008: 2006: 2005: 2000: 1995: 1990: 1985: 1980: 1978:Stealth Falcon 1975: 1970: 1965: 1960: 1955: 1953:PLA Unit 61486 1950: 1948:PLA Unit 61398 1945: 1943:Numbered Panda 1940: 1935: 1921: 1916: 1911: 1906: 1901: 1895: 1890: 1888:Equation Group 1885: 1880: 1875: 1870: 1865: 1860: 1855: 1849: 1847: 1839: 1838: 1836: 1835: 1830: 1825: 1820: 1815: 1810: 1805: 1800: 1795: 1790: 1785: 1780: 1775: 1770: 1765: 1760: 1759: 1758: 1747: 1745: 1739: 1738: 1735: 1734: 1732: 1731: 1726: 1721: 1716: 1711: 1705: 1703: 1699: 1698: 1696: 1695: 1690: 1685: 1679: 1677: 1673: 1672: 1670: 1669: 1664: 1659: 1654: 1653: 1652: 1642: 1637: 1632: 1627: 1621: 1619: 1615: 1614: 1612: 1611: 1606: 1601: 1596: 1591: 1586: 1581: 1576: 1571: 1566: 1561: 1555: 1553: 1549: 1548: 1546: 1545: 1540: 1535: 1530: 1525: 1520: 1514: 1512: 1508: 1507: 1505: 1504: 1499: 1494: 1489: 1484: 1479: 1474: 1468: 1466: 1462: 1461: 1459: 1458: 1453: 1448: 1443: 1438: 1432: 1430: 1426: 1425: 1423: 1422: 1417: 1412: 1406: 1404: 1400: 1399: 1397: 1396: 1391: 1386: 1381: 1379:HBGary Federal 1376: 1371: 1366: 1360: 1358: 1354: 1353: 1351: 1350: 1345: 1340: 1335: 1330: 1323: 1321: 1314: 1310: 1309: 1305: 1304: 1298: 1293: 1284: 1281: 1280: 1277: 1275: 1274: 1267: 1260: 1252: 1244: 1243: 1220: 1207:New York Times 1193: 1165: 1140: 1118: 1090: 1071: 1053: 1035: 1021: 992: 981:. May 18, 2017 966: 940: 911: 897: 871: 845: 820: 795: 769: 744: 718: 690: 663: 640: 614: 586: 572: 554: 534: 516: 502: 488: 462: 434: 413: 394: 363: 337: 309: 277: 276: 274: 271: 257:Podesta emails 232:Edward Snowden 228: 225: 211:reported that 191: 188: 186: 183: 153:Main article: 150: 147: 131: 128: 108:Equation Group 87: 84: 82: 79: 63: 62:Name and alias 60: 36:Equation Group 15: 13: 10: 9: 6: 4: 3: 2: 2761: 2750: 2747: 2745: 2742: 2740: 2739:Hacker groups 2737: 2736: 2734: 2715: 2712: 2710: 2707: 2705: 2702: 2700: 2697: 2695: 2692: 2690: 2687: 2685: 2682: 2681: 2679: 2675: 2669: 2666: 2665: 2663: 2659: 2653: 2650: 2648: 2645: 2643: 2640: 2638: 2635: 2633: 2630: 2628: 2625: 2623: 2620: 2619: 2617: 2613: 2607: 2604: 2602: 2599: 2597: 2594: 2592: 2589: 2587: 2584: 2582: 2579: 2577: 2574: 2572: 2569: 2567: 2564: 2563: 2561: 2557: 2551: 2548: 2546: 2543: 2541: 2538: 2536: 2533: 2532: 2530: 2526: 2520: 2517: 2515: 2514:Gameover ZeuS 2512: 2510: 2507: 2505: 2502: 2500: 2497: 2495: 2492: 2490: 2487: 2485: 2482: 2480: 2477: 2476: 2474: 2470: 2464: 2461: 2459: 2456: 2455: 2453: 2449: 2443: 2440: 2438: 2435: 2433: 2430: 2428: 2425: 2423: 2420: 2418: 2415: 2413: 2410: 2409: 2407: 2403: 2397: 2394: 2392: 2389: 2387: 2384: 2382: 2379: 2377: 2374: 2372: 2369: 2368: 2366: 2362: 2356: 2353: 2351: 2348: 2346: 2343: 2341: 2338: 2337: 2335: 2331: 2328: 2326: 2322: 2315: 2312: 2309: 2306: 2303: 2300: 2297: 2294: 2291: 2288: 2285: 2282: 2279: 2276: 2273: 2270: 2267: 2264: 2261: 2258: 2255: 2252: 2249: 2246: 2243: 2240: 2237: 2234: 2231: 2228: 2225: 2222: 2219: 2216: 2213: 2210: 2207: 2204: 2201: 2198: 2195: 2192: 2189: 2186: 2183: 2180: 2177: 2174: 2171: 2168: 2165: 2162: 2159: 2156: 2153: 2150: 2147: 2144: 2141: 2138: 2135: 2132: 2129: 2126: 2123: 2120: 2117: 2114: 2111: 2108: 2107: 2105: 2103: 2098: 2093: 2087: 2084: 2082: 2079: 2077: 2074: 2072: 2069: 2067: 2064: 2062: 2059: 2057: 2054: 2052: 2049: 2047: 2044: 2042: 2039: 2037: 2034: 2032: 2029: 2027: 2024: 2022: 2019: 2018: 2016: 2014: 2010: 2004: 2001: 1999: 1996: 1994: 1991: 1989: 1986: 1984: 1981: 1979: 1976: 1974: 1973:Rocket Kitten 1971: 1969: 1966: 1964: 1961: 1959: 1956: 1954: 1951: 1949: 1946: 1944: 1941: 1939: 1936: 1933: 1929: 1925: 1924:Lazarus Group 1922: 1920: 1917: 1915: 1912: 1910: 1907: 1905: 1902: 1899: 1896: 1894: 1891: 1889: 1886: 1884: 1881: 1879: 1876: 1874: 1871: 1869: 1866: 1864: 1861: 1859: 1856: 1854: 1851: 1850: 1848: 1846: 1840: 1834: 1831: 1829: 1826: 1824: 1821: 1819: 1816: 1814: 1811: 1809: 1806: 1804: 1801: 1799: 1796: 1794: 1791: 1789: 1786: 1784: 1781: 1779: 1776: 1774: 1771: 1769: 1766: 1764: 1761: 1757: 1754: 1753: 1752: 1749: 1748: 1746: 1744: 1740: 1730: 1727: 1725: 1722: 1720: 1717: 1715: 1712: 1710: 1707: 1706: 1704: 1700: 1694: 1691: 1689: 1686: 1684: 1681: 1680: 1678: 1674: 1668: 1667:Disqus breach 1665: 1663: 1660: 1658: 1655: 1651: 1648: 1647: 1646: 1643: 1641: 1638: 1636: 1633: 1631: 1628: 1626: 1623: 1622: 1620: 1616: 1610: 1607: 1605: 1602: 1600: 1597: 1595: 1592: 1590: 1587: 1585: 1582: 1580: 1577: 1575: 1572: 1570: 1567: 1565: 1562: 1560: 1557: 1556: 1554: 1550: 1544: 1541: 1539: 1536: 1534: 1531: 1529: 1526: 1524: 1521: 1519: 1516: 1515: 1513: 1509: 1503: 1500: 1498: 1495: 1493: 1490: 1488: 1485: 1483: 1480: 1478: 1475: 1473: 1470: 1469: 1467: 1463: 1457: 1454: 1452: 1449: 1447: 1444: 1442: 1441:Snapchat hack 1439: 1437: 1434: 1433: 1431: 1427: 1421: 1418: 1416: 1413: 1411: 1410:LinkedIn hack 1408: 1407: 1405: 1401: 1395: 1392: 1390: 1387: 1385: 1382: 1380: 1377: 1375: 1372: 1370: 1367: 1365: 1362: 1361: 1359: 1355: 1349: 1346: 1344: 1341: 1339: 1336: 1334: 1331: 1328: 1325: 1324: 1322: 1318: 1315: 1311: 1303: → 1302: 1299: 1297: 1294: 1292: 1289:←  1288: 1287: 1282: 1273: 1268: 1266: 1261: 1259: 1254: 1253: 1250: 1239: 1235: 1231: 1224: 1221: 1209: 1208: 1204: 1197: 1194: 1182: 1181: 1176: 1169: 1166: 1154: 1150: 1144: 1141: 1128: 1122: 1119: 1106: 1105: 1100: 1094: 1091: 1086: 1082: 1075: 1072: 1067: 1063: 1057: 1054: 1049: 1045: 1039: 1036: 1031: 1025: 1022: 1009: 1002: 996: 993: 980: 976: 970: 967: 955: 951: 944: 941: 928: 927: 922: 915: 912: 907: 901: 898: 885: 881: 875: 872: 859: 855: 849: 846: 834: 830: 824: 821: 809: 805: 799: 796: 784: 780: 773: 770: 758: 754: 748: 745: 732: 728: 722: 719: 707: 703: 697: 695: 691: 678: 674: 667: 664: 651: 644: 641: 628: 624: 618: 615: 603: 602: 597: 590: 587: 582: 576: 573: 568: 564: 558: 555: 550: 549: 548:The Daily Dot 544: 538: 535: 530: 526: 520: 517: 512: 506: 503: 498: 492: 489: 477: 473: 466: 463: 451: 450: 445: 438: 435: 430: 426: 420: 418: 414: 409: 405: 398: 395: 383: 382: 381:The Intercept 377: 370: 368: 364: 352: 348: 341: 338: 325: 324: 319: 313: 310: 298: 297: 292: 285: 283: 279: 272: 270: 266: 264: 263: 262:The Godfather 258: 254: 250: 249: 244: 241: 237: 233: 226: 224: 222: 218: 214: 210: 209: 204: 200: 196: 195:James Bamford 189: 184: 182: 180: 177: 172: 170: 166: 162: 156: 148: 146: 142: 139: 137: 129: 127: 125: 120: 115: 111: 109: 105: 101: 97: 93: 85: 80: 78: 75: 71: 70: 61: 59: 57: 53: 49: 45: 41: 37: 33: 29: 25: 21: 2744:Cyberwarfare 2458:CryptoLocker 2212:DoublePulsar 2031:Cyber Anakin 2021:Ryan Ackroyd 1992: 1914:Helix Kitten 1909:Hacking Team 1904:Guccifer 2.0 1778:Lizard Squad 1594:Surkov leaks 1523:Hacking Team 1223: 1211:. Retrieved 1205: 1196: 1184:. Retrieved 1178: 1168: 1156:. Retrieved 1152: 1143: 1131:. Retrieved 1121: 1109:. Retrieved 1102: 1093: 1084: 1074: 1066:Ars Technica 1065: 1056: 1047: 1038: 1024: 1012:. Retrieved 1007: 995: 985:November 15, 983:. Retrieved 978: 969: 959:November 15, 957:. Retrieved 953: 943: 931:. Retrieved 924: 914: 900: 888:. Retrieved 883: 874: 862:. Retrieved 857: 848: 836:. Retrieved 832: 823: 811:. Retrieved 807: 798: 786:. Retrieved 782: 772: 760:. Retrieved 756: 753:"misterch0c" 747: 735:. Retrieved 730: 721: 709:. Retrieved 706:Ars Technica 705: 681:. Retrieved 676: 666: 654:. Retrieved 643: 631:. Retrieved 626: 617: 605:. Retrieved 599: 589: 575: 557: 546: 537: 528: 519: 505: 491: 479:. Retrieved 476:Ars Technica 475: 465: 453:. Retrieved 449:Ars Technica 447: 437: 429:the original 407: 397: 385:. Retrieved 379: 356:November 25, 354:. Retrieved 350: 340: 328:. Retrieved 321: 312: 300:. Retrieved 294: 267: 260: 246: 245: 230: 206: 193: 176:DoublePulsar 173: 158: 143: 140: 133: 116: 112: 89: 81:Leak history 67: 65: 34:, from the " 28:hacker group 23: 19: 18: 16:Hacker group 2694:NetTraveler 2632:LogicLocker 2540:Hidden Tear 2437:Red October 2296:Dragonblood 2206:EternalBlue 2170:Stagefright 2036:George Hotz 2013:Individuals 1763:CyberBerkut 1153:twitter.com 1085:Motherboard 1014:February 7, 929:. p. 1 677:Motherboard 633:January 14, 529:Extremetech 481:January 14, 455:January 14, 199:Matt Suiche 197:along with 155:EternalBlue 149:EternalBlue 136:ETERNALBLUE 102:page and a 74:Matt Suiche 69:Mass Effect 2733:Categories 2637:Rensenware 2622:BrickerBot 2550:TeslaCrypt 2340:Bad Rabbit 2290:Foreshadow 2194:Cloudbleed 2146:Row hammer 2128:Shellshock 2122:Heartbleed 2110:Evercookie 2086:The Jester 1968:Red Apollo 1928:BlueNorOff 1898:GOSSIPGIRL 1893:Fancy Bear 1883:Elfin Team 1878:DarkMatter 1873:Dark Basin 1858:Bureau 121 1818:Teamp0ison 1743:Hacktivism 1374:DNSChanger 1186:August 22, 1158:August 22, 1133:August 22, 1111:August 22, 1008:Forcepoint 954:zerosum0x0 884:CyberScoop 567:Medium.com 273:References 234:stated on 2668:VPNFilter 2545:Rombertik 2509:FinFisher 2499:DarkHotel 2463:DarkSeoul 2371:Coreflood 2236:BlueBorne 2188:Dirty COW 2102:disclosed 2100:publicly 1938:NSO Group 1868:Cozy Bear 1808:PayPal 14 1751:Anonymous 1625:SHAttered 1369:DigiNotar 1213:April 15, 890:April 24, 864:April 15, 838:April 15, 813:April 15, 788:April 15, 762:April 15, 737:April 15, 711:April 15, 607:April 15, 387:April 15, 330:April 10, 302:April 10, 52:Microsoft 44:firewalls 2709:Titanium 2652:XafeCopy 2647:WannaCry 2576:KeRanger 2504:Duqu 2.0 2489:Carbanak 2308:BlueKeep 2284:SigSpoof 2242:Meltdown 2158:WinShock 2140:Rootpipe 2041:Guccifer 1963:Pranknet 1958:PLATINUM 1932:AndAriel 1843:Advanced 1798:NullCrew 1783:LulzRaft 1683:Trustico 1296:Timeline 1238:Archived 933:June 27, 858:Engadget 783:CNNMoney 683:April 8, 656:April 9, 652:. Medium 323:BBC News 179:backdoor 100:Pastebin 2606:X-Agent 2596:Pegasus 2479:Brambul 2442:Shamoon 2386:Kelihos 2376:Alureon 2355:Stuxnet 2325:Malware 2278:TLBleed 2260:Exactis 2248:Spectre 2182:Badlock 2116:iSeeYou 2081:Topiary 1813:RedHack 1803:OurMine 1788:LulzSec 1104:Twitter 1048:Reuters 808:AP News 236:Twitter 96:Twitter 26:) is a 2689:Joanap 2642:Triton 2581:Necurs 2571:Jigsaw 2566:Hitler 2535:Dridex 2494:Careto 2417:Dexter 2350:SpyEye 2316:(2019) 2310:(2019) 2304:(2019) 2298:(2019) 2292:(2018) 2286:(2018) 2280:(2018) 2274:(2018) 2268:(2018) 2262:(2018) 2256:(2018) 2250:(2018) 2244:(2018) 2238:(2017) 2232:(2017) 2226:(2017) 2220:(2017) 2214:(2017) 2208:(2017) 2202:(2017) 2196:(2017) 2190:(2016) 2184:(2016) 2178:(2016) 2172:(2015) 2166:(2015) 2164:JASBUG 2160:(2014) 2154:(2014) 2148:(2014) 2142:(2014) 2136:(2014) 2134:POODLE 2130:(2014) 2124:(2014) 2118:(2013) 2112:(2010) 2095:Major 2076:Track2 1998:xDedic 1828:UGNazi 757:GitHub 731:Medium 351:Forbes 119:Medium 104:GitHub 58:unit. 50:, and 2704:Tinba 2591:Mirai 2519:Regin 2432:Mahdi 2427:Flame 2412:Carna 2396:Stars 2314:Kr00k 2254:EFAIL 2224:KRACK 2176:DROWN 1301:2020s 1291:2000s 1004:(PDF) 2699:R2D2 2684:Grum 2677:2019 2661:2018 2627:Kirk 2615:2017 2586:MEMZ 2559:2016 2528:2015 2472:2014 2451:2013 2405:2012 2381:Duqu 2364:2011 2333:2010 2071:Sabu 1823:TDO 1768:GNAA 1702:2019 1676:2018 1618:2017 1552:2016 1511:2015 1465:2014 1429:2013 1403:2012 1357:2011 1320:2010 1215:2017 1188:2016 1160:2016 1135:2016 1113:2016 1016:2018 987:2017 961:2017 935:2017 892:2017 866:2017 840:2017 833:MSRC 815:2017 790:2017 764:2017 739:2017 713:2017 685:2017 658:2017 635:2017 609:2017 483:2017 457:2017 389:2017 358:2020 332:2017 304:2017 92:leak 2422:FBI 2066:MLT 1930:) ( 24:TSB 2735:: 1236:. 1232:. 1177:. 1151:. 1101:. 1083:. 1064:. 1046:. 1006:. 977:. 952:. 923:. 882:. 856:. 831:. 806:. 781:. 755:. 729:. 704:. 693:^ 675:. 625:. 598:. 565:. 545:. 527:. 474:. 446:. 416:^ 406:. 378:. 366:^ 349:. 320:. 293:. 281:^ 46:, 1934:) 1926:( 1271:e 1264:t 1257:v 1217:. 1190:. 1162:. 1137:. 1115:. 1087:. 1018:. 989:. 963:. 937:. 894:. 868:. 842:. 817:. 792:. 766:. 741:. 715:. 687:. 660:. 637:. 611:. 485:. 459:. 410:. 391:. 360:. 334:. 306:. 22:(

Index

hacker group
zero-day exploits
Equation Group
National Security Agency
firewalls
antivirus software
Microsoft
Tailored Access Operations
Mass Effect
Matt Suiche
leak
Twitter
Pastebin
GitHub
Equation Group
Medium
attack against a Syrian airfield
ETERNALBLUE
EternalBlue
WannaCry ransomware attack
Server Message Block
2017 NotPetya cyberattack
DoublePulsar
backdoor
James Bamford
Matt Suiche
Tailored Access Operations
The Washington Post
Harold T. Martin III
Booz Allen Hamilton

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.