{"id":173428,"date":"2016-08-23T09:21:36","date_gmt":"2016-08-23T13:21:36","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-shadow-brokers-nsa-hack-is-extremely-weird-business\/"},"modified":"2016-08-23T09:21:36","modified_gmt":"2016-08-23T13:21:36","slug":"the-shadow-brokers-nsa-hack-is-extremely-weird-business","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-shadow-brokers-nsa-hack-is-extremely-weird-business\/","title":{"rendered":"The Shadow Brokers&#8217; NSA hack is extremely weird &#8211; Business &#8230;"},"content":{"rendered":"<p><p>    National    Security Agency  <\/p>\n<p>    Earlier this week, a group calling itself the \"Shadow Brokers\"    announced that it     was selling a number of cyber weapons  auction-style     that it claimed were hacked and stolen from an alleged NSA    hacking group dubbed \"The Equation Group.\"  <\/p>\n<p>    Beside the fact that the National Security Agency getting    hacked is eyebrow-raising in itself, the leak of the data and    the claim from this mystery group that it's just trying to make    money doesn't seem to add up.  <\/p>\n<p>    Here's why.  <\/p>\n<p>    According     to ex-NSA insiders who spoke with Business Insider, the    agency's hackers don't just put their exploits and toolkits    online where they can potentially be pilfered. The more likely    scenario for where the data came from, says ex-NSA research    scientist Dave Aitel, is an insider who downloaded it onto a    USB stick.  <\/p>\n<p>    Instead of a \"hack,\" Aitel believes, it's much more likely that    this was a more classic spy operation that involved human    intelligence.  <\/p>\n<p>    \"This idea that a group of unknown hackers are going to take on    the NSA seems unlikely as well,\" Aitel told Business Insider.    \"There's a long arm and a long memory to the US intelligence    community, and I don't think anyone wants to be on the other    end of that without good reason. I don't necessarily think a    million bitcoin is a good-enough reason.\"  <\/p>\n<p>    Paul Szoldra\/Business    Insider  <\/p>\n<p>    One of the many strange things about this incident is the very    public nature of what transpired. When a hacker takes over your    computer, they don't start activating your webcam or running    weird programs because you'd figure out pretty quickly that    something was up and you'd try to get rid of them.  <\/p>\n<p>    The same is true for the NSA.  <\/p>\n<p>    If the Shadow Brokers owned the NSA's command and control    server, then it would probably be a much better approach to    just sit back, watch, and try to pivot to other interesting    things that they might be able to find.  <\/p>\n<p>    Instead, the group wrote on Pastebin, a website where you can    store text, that \"we follow Equation Group traffic. We    find Equation Group source range. We hack Equation Group. We    find many many Equation Group cyber weapons,\" which immediately    signals to this alleged NSA hacker group that they have a big    problem.  <\/p>\n<p>    Though this seems problematic, it's probable that the    group no longer has access to the server, so it no longer cares    about getting back on it. Since the files are years old, this    could be the case. But it's still out of the ordinary since any    claim like this can be later investigated by the victim, which    will be going through everything trying to figure out who they    are.  <\/p>\n<p>    If this was some random hacking group, then it would've    been better to keep their mouth shut, especially when their    victim is the NSA.  <\/p>\n<p>    Software exploits are digital gold for hackers, since they    often give a key inside a system or network that no one has    ever noticed before, and thus, hasn't fixed. Which is why the    marketplace for these \"zero-day\" exploits is so lucrative.    We're talking hundreds of thousands to millions of dollars for    this kind of code.  <\/p>\n<p>    Most of the time, an exploit is either found by a security    research firm, which then writes about it and reports it to the    company so it can fix the problem. Or, a hacker looking for    cash will take that found exploit and sell it on the black    market.  <\/p>\n<p>    So it would make sense for a group like Shadow Brokers to want    to sell their treasure trove, but going public with it is    beyond strange.  <\/p>\n<p>    \"From my perspective, its extremely bizarre behavior,\" an    ex-NSA hacker who spoke on condition of anonymity told Business    Insider. \"Most groups who either identify or trade in exploits    do one of two things. If you identify, like a security research    firm [does] ... they'll typically publish their findings.    They're really in the best interest of the companies and users    who use these products.\"  <\/p>\n<p>    The source added: \"In the other scenarios, folks who sort of    deal in the exploit markets. They quietly sell these things. To    come out with this public auction is the more bizarre variance    of that that I've ever seen. So it's not clear what the intent    here is.\"  <\/p>\n<p>    screenshot\/The    BBC  <\/p>\n<p>    If you ask ex-NSA contractor Edward Snowden, the public leak    and claims of the Shadow Brokers seem to have Russian    fingerprints all over them, and it serves as a warning from    Moscow to Washington. The message: If your policymakers keep    blaming us for the DNC hack, then we can use this hack to    implicate you in    much more.  <\/p>\n<p>    \"That could have significant foreign policy    consequences,\" Snowden wrote    on Twitter. \"Particularly if any of those operations targeted    US allies. Particularly if any of those operations    targeted elections.\"  <\/p>\n<p>    Aitel seems to agree, though he criticized Snowden as    being, at some level, a \"voice piece\" for Russian intelligence    now, since he lives in asylum in Moscow.  <\/p>\n<p>    \"He has the same theory      the DNC hack happened. The US political people got upset.    They probably made the NSA do a covert response,\" Aitel    speculated. \"This is another response to the NSA's covert    response. There's a lot of sort of very public messages here    going back and forth, which is interesting to look at.\"  <\/p>\n<p>    Aitel also doesn't think that anyone is going to actually pony    up the money required to win the auction. And that prediction    is probably going to be right, since WikiLeaks claims that it    already has the archive.  <\/p>\n<p>    \"We had already obtained the archive of NSA cyber weapons    released earlier today,\" its official Twitter account wrote,    \"and will release our own pristine copy in due course.\"  <\/p>\n<p>    The Shadow Brokers did not respond to an emailed request for    comment.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.businessinsider.com\/nsa-shadow-brokers-hack-weird-2016-8\" title=\"The Shadow Brokers' NSA hack is extremely weird - Business ...\">The Shadow Brokers' NSA hack is extremely weird - Business ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> National Security Agency Earlier this week, a group calling itself the \"Shadow Brokers\" announced that it was selling a number of cyber weapons auction-style that it claimed were hacked and stolen from an alleged NSA hacking group dubbed \"The Equation Group.\" Beside the fact that the National Security Agency getting hacked is eyebrow-raising in itself, the leak of the data and the claim from this mystery group that it's just trying to make money doesn't seem to add up. Here's why.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-shadow-brokers-nsa-hack-is-extremely-weird-business\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-173428","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173428"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=173428"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/173428\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=173428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=173428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=173428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}