It's unclear if a subscription-based model will attract more interest, with no price announced yet. Though the Shadow Brokers' online statement did not mention any other tech industry product by name, there was mention of threats to dump data from banks using the SWIFT worldwide money transfer network and to dump data from Russian, Chinese, Iranian or North Korean nuclear and missile programs.
Hacking group the Shadow Brokers was the key link in last week's WannaCrypt chaos, having released the NSA's hacking tools which allowed the malware to be weaponized so well.
"Financial spying by the NSA is probably the most important and least liberty-infringing bulk-style program possible - and I doubt anyone outside the targeted countries would have a problem with the NSA spying on foreign WMD and missile programs", Weaver wrote.
WannaCry ransomware attack might have slowed down, but it has managed to infect over 300,000 computers globally, with many businesses and even hospitals losing access to precious data. Is being like wine of month club.
This EternalBlue vulnerability was actually first discovered by the United States security agency NSA, but the agency's hacking arsenal was stolen by the Shadow Brokers, and now the hacker group responsible for this theft has written a blogpost. "Each month peoples can be paying membership fee, then getting members only data dump each month".
Shadow Brokers group will begin releasing access to some of the tech world's biggest commercial secrets.
Microsoft didn't immediately respond to a request for comment.
'Most hounded leader ever' - Donald Trump claims witch hunt over Russian Federation investigation
Some in Trump-world view the leaks coming out of the government as a mortal threat. Yet US allies and some members of Congress have expressed alarm.
The Shadow Brokers said it chose to share screenshots from the NSA Equation Group's lost 2013 Windows Ops Disk in January, with the understanding that the Equation Group would then tell Microsoft and the vulnerability would be patched.
The WannaCry attack stoked fears that the spy agency's powerful cyber weapons could now be turned to criminal use, ratcheting up cyber security threats to a new level.
In their post, the Shadow Brokers have come out to warn the NSA and said they have access to "75 per cent of USA cyber arsenal".
Imagine a loot box - but for security exploits.
The group claims that a screenshot it posted in January alerted the Equation Group that it had access to the EternalBlue exploit, and that this was responsible for Microsoft missing a security update in February.
The US government said it seized 50 terabytes of confidential data from Martin's home which was stolen from the NSA and other intelligence agencies.
While some analysts originally theorized that the Shadow Brokers had stolen spy-agency-linked cyberweapons by breaking into a misconfigured, off-premise attack server, the subsequent and recent publication of an internal NSA PowerPoint slide effectively proved that the group acquired information that would only exist within a closed, classified environment. Microsoft president and chief legal officer Brad Smith said earlier this week the WannaCry attack used elements stolen from NSA cyber warfare operations.
- Another viewpoint: If Clinton did what Trump has done
- Manchester City Zabaleta announcement opens door for Bilic — Transfer Focus
- Inflation rate drops for third consecutive month
- Ces joueurs d’origine africaine évoluant pour des nations européennes
- Golden State Warriors stomp Spurs in Game 2
- New York Times Square crash: Driver arrested
- Worldwide effort set to keep Trump happy on 1st trip abroad
- No indication yet from Flynn on subpoena
- You can now play with Windows 10's impressive Story Remix video editor
- Wizarding World Hollywood announces epic nighttime show at Hogwarts Castle