{"id":173384,"date":"2016-08-19T04:08:44","date_gmt":"2016-08-19T08:08:44","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/powerful-nsa-hacking-tools-have-been-revealed-online-the\/"},"modified":"2016-08-19T04:08:44","modified_gmt":"2016-08-19T08:08:44","slug":"powerful-nsa-hacking-tools-have-been-revealed-online-the","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/powerful-nsa-hacking-tools-have-been-revealed-online-the\/","title":{"rendered":"Powerful NSA hacking tools have been revealed online &#8211; The &#8230;"},"content":{"rendered":"<p><p>      Strings of code were released to the      Internet by a group calling themselves \"the Shadow Brokers\".      They claim the code is a tool that can be used to hack into      any computer. (Jhaan Elker\/The Washington Post)    <\/p>\n<p>    Some of the most powerful espionage tools created by the    National Security Agencys elite group of hackers have been    revealed in recent days, a development that could pose severe    consequences for the spy agencys operations and the security    of government and corporate computers.  <\/p>\n<p>    A cache of hacking tools with code names such as Epicbanana,    Buzzdirection and Egregiousblunder appeared mysteriously online    over the weekend, setting the security world abuzz with    speculation over whether the material was legitimate.  <\/p>\n<p>    The file appeared to be real, according to former NSA personnel    who worked in the agencys hacking division, known as Tailored    Access Operations (TAO).  <\/p>\n<p>    Without a doubt, theyre the keys to the kingdom, said one    former TAO employee, who spoke on the condition of anonymity to    discuss sensitive internal operations. The stuff youre    talking about would undermine the security of a lot of major    government and corporate networks both here and abroad.  <\/p>\n<p>    Said a second former TAO hacker who saw the file: From what I    saw, there was no doubt in my mind that it was legitimate.  <\/p>\n<p>    [National Security    Agency plans major reorganization]  <\/p>\n<p>    The file contained 300 megabytes of information, including    several exploits, or tools for taking control of firewalls in    order to control a network, and a number of implants that    might, for instance, exfiltrate or modify information.  <\/p>\n<p>    The exploits are not run-of-the-mill tools to target everyday    individuals. They are expensive software used to take over    firewalls, such as Cisco and Fortinet, that are used in the    largest and most critical commercial, educational and    government agencies around the world, said Blake Darche,    another former TAO operator and now head of security research    at Area 1 Security.  <\/p>\n<p>    The software apparently dates back to 2013 and appears to have    been taken then, experts said, citing file creation dates,    among other things.  <\/p>\n<p>    Whats clear is that these are highly sophisticated and    authentic hacking tools, said Oren Falkowitz, chief executive    of Area 1 Security and another former TAO employee.  <\/p>\n<p>    Several of the exploits were pieces of computer code that took    advantage of zero-day or previously unknown flaws or    vulnerabilities in firewalls, which appear to be unfixed to    this day, said one of the former hackers.  <\/p>\n<p>    The disclosure of the file means that at least one other party     possibly another countrys spy agency  has had access to the    same hacking tools used by the NSA and could deploy them    against organizations that are using vulnerable routers and    firewalls. It might also see what the NSA is targeting and    spying on. And now that the tools are public, as long as the    flaws remain unpatched, other hackers can take advantage of    them, too.  <\/p>\n<p>    [Russian government    hackers penetrated DNC, stole opposition research on    Trump]  <\/p>\n<p>    The NSA did not respond to requests for comment.  <\/p>\n<p>    Faking this information would be monumentally difficult, there    is just such a sheer volume of meaningful stuff, Nicholas Weaver, a computer security researcher at    the University of California at Berkeley, said in an interview.    Much of this code should never leave the NSA.  <\/p>\n<p>    The tools were posted by a group calling itself the Shadow    Brokers using file-sharing sites such as BitTorrent and    DropBox.  <\/p>\n<p>    As is typical in such cases, the true identity of whoever put    the tools online remains hidden. Attached to the cache was an    auction note that purported to be selling a second set of    tools to the highest bidder: !!! Attention government sponsors    of cyber warfare and those who profit from it !!!! How much you    pay for enemies cyber weapons?  <\/p>\n<p>    The group also said that if the auction raised 1 million    bitcoins  equivalent to roughly $500million  it would    release the second file to the world.  <\/p>\n<p>    The auction is a joke, Weaver said. Its designed to    distract. Its total nonsense. He said that bitcoin is so    traceable that a Doctor Evil scheme of laundering $1 million,    let alone $500 million, is frankly lunacy.  <\/p>\n<p>    One of the former TAO operators said he suspected that whoever    found the tools doesnt have everything. The stuff they have    there is super-duper interesting, but it is by far not the most    interesting stuff in the tool set, he said. If you had the    rest of it, youd be leading off with that, because youd be    commanding a much higher rate.  <\/p>\n<p>    TAO, a secretive unit that helped craft the digital weapon    known as Stuxnet, has grown in the past decade or so from    several hundred to more than 2,000 personnel at the NSAs Fort    Meade, Md., headquarters. The group dates to the early 1990s.    Its moniker, Tailored Access Organization, suggests a precision    of technique that some officials have likened to brain surgery.    Its name also reflects how coding whizzes create exquisite    tools from scratch, in the same way a fine tailor takes a bolt    of wool and fashions a bespoke suit  only the computer geeks    more often work in jeans and T-shirts. We break out the Nerf    guns and have epic Nerf gun fights, one of the former hackers    said.  <\/p>\n<p>    Some former agency employees suspect that the leak was the    result of a mistake by an NSA operator, rather than a    successful hack by a foreign government of the agencys    infrastructure.  <\/p>\n<p>    When NSA personnel hack foreign computers, they dont move    directly from their own covert systems to the targets, fearing    that the attack would be too easy to trace. They use a form of    proxy server called a redirector that masks the hackers    origin. They use one or more such servers to make it difficult    to trace a hack.  <\/p>\n<p>    NSA is often lurking undetected for years on the ... [proxy    hops] of state hackers, former agency contractor Edward    Snowden tweeted Tuesday. This is how we follow their    operations.  <\/p>\n<p>    [Edward Snowden, the    brand]  <\/p>\n<p>    At the same time, other spy services, like Russias, are doing    the same thing to the United States.  <\/p>\n<p>    It is not unprecedented for a TAO operator to accidentally    upload a large file of tools to a redirector, one of the former    employees said. Whats unprecedented is to not realize you    made a mistake, he said. You would recognize, Oops, I    uploaded that set and delete it.  <\/p>\n<p>    Critics of the NSA have suspected that the agency, when it    discovers a software vulnerability, frequently does not    disclose it, thereby putting at risk the cybersecurity of    anyone using that product. The file disclosure shows why its    important to tell software-makers when flaws are detected,    rather than keeping them secret, one of the former agency    employees said, because now the information is public,    available for anyone to employ to hack widely used Internet    infrastructure.  <\/p>\n<p>    Snowden, Weaver and some of the former NSA hackers say they    suspect Russian involvement in the release of the cache, though    no one has offered hard evidence. They say the timing  in the    wake of high-profile disclosures of Russian government    hacking of the Democratic National Committee and other    party organizations  is notable.  <\/p>\n<p>    Tweeted Snowden: Circumstantial evidence and conventional    wisdom indicates Russian responsibility. He said that the    disclosure is likely a warning that someone can prove U.S.    responsibility for any attacks that originated from this    redirector or malware server by linking it to the NSA.  <\/p>\n<p>    This could have significant foreign policy consequences, he    said in another tweet. Particularly if any of those operations    targeted U.S. allies or their elections.  <\/p>\n<p>    Accordingly, he tweeted, this may be an effort to influence    the calculus of decision-makers wondering how sharply to    respond to the DNC hacks.  <\/p>\n<p>    In other words, he tweeted, it looks like somebody sending a    message that retaliating against Russia for its hacks of the    political organizations could get messy fast.  <\/p>\n<p>    Read more:  <\/p>\n<p>    WikiLeaks, NSA leaker Edward    Snowden clash on Twitter  <\/p>\n<p>    The NSAs phone records program    is over. That doesnt mean the data it collected is gone.  <\/p>\n<p>    In a major    cyber-hack, whom do you call? The White House spells it    out.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/powerful-nsa-hacking-tools-have-been-revealed-online\/2016\/08\/16\/bce4f974-63c7-11e6-96c0-37533479f3f5_story.html\" title=\"Powerful NSA hacking tools have been revealed online - The ...\">Powerful NSA hacking tools have been revealed online - The ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Strings of code were released to the Internet by a group calling themselves \"the Shadow Brokers\". They claim the code is a tool that can be used to hack into any computer <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/powerful-nsa-hacking-tools-have-been-revealed-online-the\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-173384","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173384"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=173384"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173384\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=173384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=173384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=173384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}