The hacking group that says data they released facilitated the WannaCry ransomware attack has threatened to leak a new wave of hacking tools they claim to have stolen from the US National Security Agency.
The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.Read more
The U.S. National Security Agency collected more than 151 million records of Americans' phone calls last year, even after Congress limited its ability to collect bulk phone records.
The report from the office of Director of National Intelligence Dan Coats was the first measure of the effects of the 2015 USA Freedom Act, which limited the NSA to collecting phone records and contacts of people U.S. and allied intelligence agencies suspect may have ties to terrorism. It found that the NSA collected the 151 million records even though it had warrants from the secret Foreign Intelligence Surveillance court to spy on only 42 terrorism suspects in 2016.Read more
It's been little over a week and a half since a hacker crew called the Shadow Brokers released a batch of tools believed to have belonged to the NSA, designed to break through the defences of Windows systems.
Whilst Microsoft mysteriously patched its operating system to deflect attacks using the exploits a month before Shadow Brokers went public, the number of infected systems is still rising fast, as malicious hackers the world over take advantage of those who chose not to update. And Russia's cybercriminals have been tinkering with the leaked NSA arsenal as they look to piggyback on the technical prowess of America's finest digital spies.Read more
Hacker group Shadow Brokers released a fresh batch of alleged NSA hacking tools, which security experts said contain a whole host of exploits capable of causing widespread cyber panic.
One such tool uncovered by security researchers hints at the first real connection between the NSA and the infamous Stuxnet worm, which made headlines in 2010 after it was used against Iran, in what is considered as one of the first targeted cyberespionage attacks. Previous reports indicate that Stuxnet has long been suspected to have been developed by a collaborative effort between the NSA and Israel.Read more
Thanks to the Shadow Brokers, any hacker can now easily attack and pwn millions of Windows computers on the internet.
On Friday, the group known as The Shadow Brokers dropped the hacking equivalent of a bomb, or perhaps several bombs, giving hackers all over the world the tools to easily break into millions of Windows computers. "This is internet god mode for Microsoft computers," a security researcher told in an online chat. After weeks of silence, The Shadow Brokers came back last Saturday to drop a long-awaited set of files that turned out to be just underwhelming, old Linux hacking toolsRead more
IXmaps wants to “make visible the secret, dangerous, often illegal forms of surveillance that are increasingly becoming part of everyday life.”
Internet data pinballs across national borders, and for Canadians this means potentially exposing it to eavesdropping by US-based corporations and the National Security Agency. Now, an interactive mapping tool named Internet Exchange Mapping (IXmaps), re-launched for public use today, will show you how — and how easily — you data can be spied on by tracing the oftentimes byzantine routes data takes when traversing the internet.Read more
Data obtained through a Freedom of Information Act request reveals just how popular the NSA's social network for spies called eChirp really is.
Last week, the secret-spilling website WikiLeaks made headlines once more for publishing a large cache of alleged secret files about the CIA's hacking operations. Those files apparently came from a little-known service for the US intelligence community known as Intellipedia. Many probably still don't know of the "Wikipedia for spies." And many probably don't know that there's also a Twitter for spies, called eChirp. The service is widely used among American spies.Read more
On Monday, experts reported one of the most stunning breaches of security ever. A former NSA contractor, the paper said, stole more than 50 terabytes of highly sensitive data. According to one source, that includes more than 75 percent of the hacking tools belonging to the Tailored Access Operations.
TAO is an elite hacking unit that develops and deploys some of the world's most sophisticated software exploits. Attorneys representing Harold T. Martin III have previously portrayed the former NSA contractor as a patriot who took NSA materials home so that he could become better at his job.Read more
The Shadow Brokers who previously stole and leaked a portion of the NSA hacking tools and exploits is back with a Bang!
The hacking group is now selling another package of hacking tools, “Equation Group Windows Warez,” which includes Windows exploits and antivirus bypass tools, stolen from the NSA-linked hacking unit, The Equation Group. The Shadow Brokers is a notorious group of black-hat hackers who, in August 2016, leaked exploits, security vulnerabilities, and "powerful espionage tools" created by The Equation Group. On Saturday, the Shadow Brokers announced the sale of the entire "Windows Warez" collection.Read more
In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: “What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight.”
This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA’s Signals Intelligence Directorate, or SID, and it was classified “top secret.” It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft.Read more
110 Reykjavik, Iceland