Russian-speaking cyberespionage group APT28, also known as Sofacy, is believed to be behind a series of attacks last month against travelers staying in hotels in Europe and the Middle East. APT28 notably used the NSA hacking tool EternalBlue as part of its scheme to steal credentials from business travelers, according to a report released Friday by security firm FireEye.
One of the goals of the attack is to trick guests to download a malicious document masquerading as a hotel reservation form that, if opened and macros are enabled, installs a dropper file that ultimately downloads malware called Gamefish.Read more
The NSA — the United States intelligence agency which is known for its secrecy and working in the dark — has finally joined GitHub and launched an official GitHub page.
The NSA employs genius-level coders and brightest mathematicians, who continually work to break codes, gather intelligence on everyone, and develop hacking tools like EternalBlue that was leaked by the Shadow Brokers in April and abused by the WannaCry ransomware last month to wreak havoc worldwide. The intelligence agency mostly works in secret, but after Edward Snowden leaks in 2013, the NSA has started opening itself to the world.Read more
Brace yourselves for a possible 'second wave' of massive global cyber attack, as SMB was not the only network protocol whose zero-day exploits created by NSA were exposed in the Shadow Brokers dump last month.
Although Microsoft released patches for SMB flaws for supported versions in March and unsupported versions immediately after the outbreak of the WannaCry ransomware, the company ignored to patch other three NSA hacking tools, dubbed "EnglishmanDentist," "EsteemAudit," and "ExplodingCan." It has been almost two weeks since WannaCry ransomware began to spread, which infected nearly 300,000 computers in more than 150 countries.Read more
If the NSA's leaked hacking tools had a Voltron, it would be EternalRocks. On Sunday, researchers confirmed new malware, named EternalRocks, that uses seven exploits first discovered by the National Security Agency and leaked in April by the Shadow Brokers group. Experts described the malware as a "doomsday" worm that could strike suddenly.
Earlier this month, the WannaCry ransomware plagued hospitals, schools and offices around the world and spread to more than 300,000 computers. It uses two NSA exploits that were leaked by the Shadow Brokers, EternalBlue and DoublePulsar.Read more
The hacking group that says data they released facilitated the WannaCry ransomware attack has threatened to leak a new wave of hacking tools they claim to have stolen from the US National Security Agency.
The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.Read more
The U.S. National Security Agency collected more than 151 million records of Americans' phone calls last year, even after Congress limited its ability to collect bulk phone records.
The report from the office of Director of National Intelligence Dan Coats was the first measure of the effects of the 2015 USA Freedom Act, which limited the NSA to collecting phone records and contacts of people U.S. and allied intelligence agencies suspect may have ties to terrorism. It found that the NSA collected the 151 million records even though it had warrants from the secret Foreign Intelligence Surveillance court to spy on only 42 terrorism suspects in 2016.Read more
It's been little over a week and a half since a hacker crew called the Shadow Brokers released a batch of tools believed to have belonged to the NSA, designed to break through the defences of Windows systems.
Whilst Microsoft mysteriously patched its operating system to deflect attacks using the exploits a month before Shadow Brokers went public, the number of infected systems is still rising fast, as malicious hackers the world over take advantage of those who chose not to update. And Russia's cybercriminals have been tinkering with the leaked NSA arsenal as they look to piggyback on the technical prowess of America's finest digital spies.Read more
Hacker group Shadow Brokers released a fresh batch of alleged NSA hacking tools, which security experts said contain a whole host of exploits capable of causing widespread cyber panic.
One such tool uncovered by security researchers hints at the first real connection between the NSA and the infamous Stuxnet worm, which made headlines in 2010 after it was used against Iran, in what is considered as one of the first targeted cyberespionage attacks. Previous reports indicate that Stuxnet has long been suspected to have been developed by a collaborative effort between the NSA and Israel.Read more
Thanks to the Shadow Brokers, any hacker can now easily attack and pwn millions of Windows computers on the internet.
On Friday, the group known as The Shadow Brokers dropped the hacking equivalent of a bomb, or perhaps several bombs, giving hackers all over the world the tools to easily break into millions of Windows computers. "This is internet god mode for Microsoft computers," a security researcher told in an online chat. After weeks of silence, The Shadow Brokers came back last Saturday to drop a long-awaited set of files that turned out to be just underwhelming, old Linux hacking toolsRead more
IXmaps wants to “make visible the secret, dangerous, often illegal forms of surveillance that are increasingly becoming part of everyday life.”
Internet data pinballs across national borders, and for Canadians this means potentially exposing it to eavesdropping by US-based corporations and the National Security Agency. Now, an interactive mapping tool named Internet Exchange Mapping (IXmaps), re-launched for public use today, will show you how — and how easily — you data can be spied on by tracing the oftentimes byzantine routes data takes when traversing the internet.Read more