{"id":187905,"date":"2017-04-15T17:17:59","date_gmt":"2017-04-15T21:17:59","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsas-arsenal-of-windows-hacking-tools-have-leaked-zdnet\/"},"modified":"2017-04-15T17:17:59","modified_gmt":"2017-04-15T21:17:59","slug":"nsas-arsenal-of-windows-hacking-tools-have-leaked-zdnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsas-arsenal-of-windows-hacking-tools-have-leaked-zdnet\/","title":{"rendered":"NSA&#8217;s arsenal of Windows hacking tools have leaked | ZDNet"},"content":{"rendered":"<p><p>    (Image: file photo)  <\/p>\n<p>    A new trove of alleged surveillance tools and exploits from the    National Security Agency's elite hacking team have been released by the Shadow Brokers' hacking    group.  <\/p>\n<p>    The group Friday appeared to release tools designed to target    Windows PCs and servers, along with presentations and files    purporting to detail the agency's methods of carrying out    clandestine surveillance.  <\/p>\n<p>    According to several documents, the NSA used the Windows    hacking tools to target several banks, including the SWIFT    banking system.  <\/p>\n<p>    The dump of Windows exploits -- arguably affecting the most    people and organizations and likely to cause the most damage    and embarrassment to the intelligence agency -- has been    expected since the hacking group first emerged on the scene    last year.  <\/p>\n<p>    In case you missed it, hacking tools that were confirmed to belong to the NSA's so-called    Equation Group were stolen     last year in one of the biggest breaches of classified    files since the Edward Snowden revelations. These tools,    allowed NSA analysts to     break into a range of systems, network equipment, and    firewalls, and most recently tools to target the Linux operating system -- many    of which were old and outdated. The group attempted to auction    off the files but failed, and have been releasing portions of    the stolen files in stages.  <\/p>\n<p>    Researchers are currently poring over the cache of files.  <\/p>\n<p>    Several of the files we've seen appear to be \"top secret\" in    classification, such as JeepfleaMarket, which appears to utilize the Jeepflea program to collect data on    servers at least nine international banks.  <\/p>\n<p>    The document purports to show the infrastructure behind the    system, along with another document, which shows that the NSA    has deep access to some networks by exploiting    VPN and firewall systems.  <\/p>\n<p>    (Image: supplied, via Kevin Beaumont)  <\/p>\n<p>    It appears that most of the exploits target older Windows    versions, dating back as early as Windows XP and Windows Server    2003.  <\/p>\n<p>    Among the more interesting exploits found in the cache include    ExplodingCan, which exploits older versions    of Windows' web server Internet Information Services with a remote backdoor. Security researcher    Kevin Beaumont, who examined the exploit, said in a tweet that the tool was \"very well\"    built.  <\/p>\n<p>    Another exploit, dubbed EmeraldThread, is a remote Windows SMB    exploit for Windows XP and 2003.  <\/p>\n<p>    And while little is known about the so-called OddJob implant, it appears to    have exploits for almost every version of Windows 2000 and    later, including some server editions, some of which may still    work.  <\/p>\n<p>    Other tools point to several other remote exploits in every version of Windows, according to    Hacker Fantastic, a security researcher who has been analyzing    the files. (The researcher followed up in a tweet noting that    not current all patches were applied at the    time.)  <\/p>\n<p>    The researcher was able to run many of the exploits found in    the cache, according to a tweet.  <\/p>\n<p>    It's not known how many of the exploits, if any, are unknown to    the manufacturer. These so-called zero-day vulnerabilities are    closely guarded secrets to allow analysts to carry out    surveillance.  <\/p>\n<p>    But Beaumont said that some of the tools he examined \"may be\"    previously undisclosed, but they have yet \"to be confirmed.\"  <\/p>\n<p>    A Microsoft spokesperson said in a statement late Friday that    it has \"confirmed that the exploits disclosed by the Shadow    Brokers have already been addressed by previous updates to our    supported products,\" and gave a more detailed breakdown    in a blog post.  <\/p>\n<p>    A spokesperson for the NSA did not return a call Friday.  <\/p>\n<p>    This post has been updated several times over the past few    days, and some information relating to Windows 8 was removed    after claims were proven incorrect.  <\/p>\n<p>    Everyday ways your personal privacy is under    threat:  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.zdnet.com\/article\/shadow-brokers-latest-file-drop-shows-nsa-targeted-windows-pcs-banks\/\" title=\"NSA's arsenal of Windows hacking tools have leaked | ZDNet\">NSA's arsenal of Windows hacking tools have leaked | ZDNet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> (Image: file photo) A new trove of alleged surveillance tools and exploits from the National Security Agency's elite hacking team have been released by the Shadow Brokers' hacking group. The group Friday appeared to release tools designed to target Windows PCs and servers, along with presentations and files purporting to detail the agency's methods of carrying out clandestine surveillance. According to several documents, the NSA used the Windows hacking tools to target several banks, including the SWIFT banking system.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsas-arsenal-of-windows-hacking-tools-have-leaked-zdnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-187905","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187905"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=187905"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187905\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=187905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=187905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=187905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}