The US Justice Department's indictment of 12 Russians for alleged hacking offences connected to the 2016 US presidential election on Friday has got at least one ex-NSA hacker fearing a reprisal.
A group of researchers from the University College London, who have completed a study on the privacy-focused digital currency Zcash, may have provided a means of finding out who received payment for NSA exploits that were put on sale by a group known as the Shadow Brokers.
The US Government has named a suspect in the theft of documents from the CIA, which WikiLeaks released under the name Vault 7 from March last year, but has been unable to file charges against the man even though he has been detained since a week after the first leak.
A year after a leaked NSA Windows exploit known as EternalBlue was used to create the WannaCry ransomware that caused chaos around the world, a security researcher says it is being used more than ever by attackers in crafting threats.
At times, it does not pay to be the brightest kid on the block. But Kaspersky Lab, which has been in the forefront of A-V research for some time, would have got away even with this, had it not been for a catastrophic leak of Windows vulnerabilities crafted by the NSA via a group that has called itself the Shadow Brokers.
The holders of three accounts are believed to be involved in "fraudulent remittances" from India's City Union Bank to the tune of about US$2 million.
American intelligence agencies have been making an undercover effort to recover from Russian operatives material stolen from the NSA and, in part, exposed on the Web by a group known as the Shadow Brokers, a report claims.
Last year, the three big mainstream US newspapers ran articles that more or less spelt the death knell for Kaspersky Lab's deals with the American public sector. The new year has hardly begun, but The Wall Street Journal has been quick off the mark to recycle old claims against the Russian security firm, apparently relying on the old adage that if mud is thrown, then some will stick.
Former Washington Post employee Brian Krebs has taken down a story he wrote recently, claiming that a man with a Russian name could be the person who leaked NSA exploits to a group known as the Shadow Brokers.
More "evidence" has emerged this week, once again from a security company, this one based in Washington DC, that appears to point the finger at Russian involvement in the leaking of NSA exploits on the Web last year.
The NSA's counter-intelligence arm, the Q Group, and the FBI have no clue as to how exploits created by the NSA's Tailored Access Operations group leaked to the outside world, despite 15 months of investigation.
The Shadow Brokers, the group that has dumped many Windows exploits from NSA on the Web in April, has surfaced again, offering more exploits provided payment is made in Zcash.
The US government is trying to trace the identities behind the group called Shadow Brokers which dumped a number of NSA Windows exploits on the Web in April, some of which were used in the last two global ransomware attacks.
The Shadow Brokers, the group that has leaked NSA exploits that have been used to craft the malware used in the last two big attacks, say they will be raising the price for any leaks in July.
The people behind the latest malware outbreak probably had access to NSA exploits — which were used to craft the malicious code — well before the Shadow Brokers dumped them on the Web in April, researchers from the Finnish security firm F-Secure claim.
The WannaCry worm, which hit Windows computers last month, is still making news, with Honda Motor Company reporting that it had to shut down a plant in Sayama, northwest Tokyo, on Monday when it found the worm in its networks.
Microsoft has issued patches for older versions of Windows against NSA exploits that were leaked by the Shadow Brokers back in April.
Researchers from the British security firm Secarma have predicted that, based on what happened with the WannaCry ransomware, the next NSA exploit to be weaponised could be one named ExplodingCan.
Two researchers who started a fund-raiser on Patreon to buy the next set of exploits offered by the Shadow Brokers have shut it down after advice from legal experts that they could fall afoul of the US justice system by going ahead with the purchase.
Two security researchers, supported by a number of others, have launched a fund-raiser aimed at collecting enough money to buy the next set of NSA security exploits offered by the Shadow Brokers group.
I find it strange that things like watching streaming media such as Netflix or listening to music should be classifieded[…]
thanks for this post
There's a lot more in US District Judge Yvonne Gonzalez Rogers' decision than you have reported here. Apple won all[…]
I'm a retired proofreader with a lot of free time on my hands and would happily work as a moderator[…]
All this ruling does is clarify the situation and confirm the commonsense proposition that what has long been generally unlawful[…]