Mercredi, 24 Juillet 2019
Dernières nouvelles
Principale » Shadow Brokers boasts of more Windows exploits and cyberespionage data

Shadow Brokers boasts of more Windows exploits and cyberespionage data

19 Mai 2017

After failing to get a bidder for the leaked files, the Shadow Brokers released a part of their horde in April 2017, some of which was subsequently incorporated into the WannaCry ransomware.

In the blog post, Shadow Brokers mention that they're taking a stern approach towards fighting the cybersecurity practices across the globe - and they think leaking sensitive data is the best option to do so.

In the post, which will worry security agencies and companies around the world, the Shadow Brokers said: "In June, TheShadowBrokers is announcing "TheShadowBrokers Data Dump of the Month" service".

It claimed to have exploits for web browsers, routers, operating systems (including Windows 10), compromised data from banks and Swift providers and stolen network data from Russian, Chinese, Iranian, and North Korean nuclear missile programs.

Shadow Brokers came to public attention last August when it mounted an unsuccessful attempt to auction off a set of older cyber-spying tools it said were stolen from the U.S. National Security Agency.

The Shadow Brokers are threatening to make public more of the exploits and tools that they have access to, thanks to the NSA hack.

The post says they will launch a "new monthly subscription model", and compare it to "wine of month club".

No indication yet from Flynn on subpoena
The Intelligence Committee is seeking to interview Flynn as part of its probe of Russian election interference. Popular Video SNL is not a fan of the Trump administration, and it shows with every new skit they produce.

Given that the group has come good on most of its threats previously, this latest warning is likely to cause more than a little concern at NSA HQ. Spokesperson from Microsoft has already said that they will be preparing a response for this claim from the hacking group.

The Shadow Brokers said it chose to share screenshots from the NSA Equation Group's lost 2013 Windows Ops Disk in January, with the understanding that the Equation Group would then tell Microsoft and the vulnerability would be patched.

What is more interesting is the fact that one of the countries the group tried to sell data to is Korea, which puts the theory of North Korea being behind the WannaCry attacks under serious doubt. They're planning to release more NSA hacking tools in June, offering access to them to anyone willing to pay. "Microsoft has been critical of the United States government over this stockpiling of vulnerability code, and said this was equivalent to the government losing it stock of 'Tomahawk missiles".

The release included a Windows SMB [Server Message Block] exploit, EternalBlue, which was leveraged in the recent WannaCry global ransomware attack.

According to the Shadow Brokers, Microsoft proceeded to cancel February's Patch Tuesday so they could work on the patches the company delivered in March.

"Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage." - said Microsoft's Brad Smith - "An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen".