Security Market Segment LS
Tuesday, 23 February 2021 08:58

Second case of NSA exploits being used before Brokers' leak comes to light Featured

Second case of NSA exploits being used before Brokers' leak comes to light Image by Beppe Karlsson from Pixabay

A second case of NSA exploits being customised and used for attacks, before they were leaked on the Web by a group known as the Shadow Brokers in 2017, has come to light, this time following research by the Israel-based cyber security firm Check Point Research.

Researchers Eyal Itkin and Itay Cohen said in a detailed technical blog post that their research indicated the exploits — which they attributed to the Equation Group, a term coined by security outfit Kaspersky in 2015 as an alias for the NSA — had reached the hands of an alleged Chinese group which then repurposed them to attack American targets.

The first instance of this happening was reported by Symantec in May 2019, with its research showing that a group, which it named Buckeye, had been in possession of, and utilising, the NSA exploits in question.

Symantec said one possibility for the leak it found, was that Buckeye "may have engineered its own version of the tools from artefacts found in captured network traffic, possibly from observing an Equation Group attack".

Itkin and Cohen listed their main findings as under:

  • "The caught-in-the-wild exploit of CVE-2017-0005, a 0-Day attributed by Microsoft to the Chinese APT31 (Zirconium), is in fact a replica of an Equation Group exploit code-named 'EpMe';
  • "APT31 had access to EpMe’s files, both their 32-bit and 64-bit versions, more than two years before the Shadow Brokers' leak;
  • "The exploit was replicated by the APT during 2014 to form 'Jian', and used since at least 2015, until finally caught and patched in March 2017;
  • "The APT31 exploit was reported to Microsoft by Lockheed Martin’s Computer Incident Response Team, hinting at a possible attack against an American target;
  • "The framework containing the EpMe exploit is dated to 2013, and contains four Windows Privilege Escalation exploits overall, two of which were 0-Days at the time of the framework’s development.
  • "One of the 0-Days in the framework, code-named 'EpMo', was never publicly discussed, and was patched by Microsoft with no apparent CVE-ID in May 2017. This was seemingly in response to the Shadow Brokers leak."

check point nsa

Timeline of the events detailing the story of EpMe / Jian / CVE-2017-0005.

The Brokers announced they were in possession of hacking tools in 2016 and sought interested parties to negotiate a sale. When nobody engaged with them, they dumped the exploits on the Web in 2017.

One of these exploits, known as EternalBlue, was used to craft the Windows ransomware known as WannaCry which wreaked havoc in many countries in May the same year.

The identity of the Brokers has never been revealed, with the NSA telling iTWire as recently as September last year that it had no information to offer as to who was behind the group.

Read 2739 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Thoughtworks presents XConf Australia, back in-person in three cities, bringing together people who care deeply about software and its impact on the world.

In its fifth year, XConf is our annual technology event created by technologists for technologists.

Participate in a robust agenda of talks as local thought leaders and Thoughtworks technologists share first-hand experiences and exchange new ways to empower teams, deliver quality software and drive innovation for responsible tech.

Explore how at Thoughtworks, we are making tech better, together.

Tickets are now available and all proceeds will be donated to Indigitek, a not-for-profit organisation that aims to create technology employment pathways for First Nations Peoples.

Click the button below to register and get your ticket for the Melbourne, Sydney or Brisbane event



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News