Home Security Hacker group releases password for NSA tools cache
Hacker group releases password for NSA tools cache Featured

Shadow Brokers, a group that last year released a load of exploits from the Equation Group which is suspected to be allied to the NSA, has released the password for an encrypted cache of files which it put online.

In a rambling political rant addressed to US President Donald Trump in response to the US air strikes on Syria, the group said "Be considering this our form of protest".

Among the tools released overnight are:

  • the source code for the TOAST framework which the NSA has used to clean its tracks after an exploit;
  • source code for a tool called PITCHIMPAIR which is used to penetrate servers; and
  • a table of backdoors for servers, mostly in Europe, Asia and South America.

A researcher, who goes by the handle x0rz on Twitter, claimed that the cache also included a Solaris exploit.

In August 2016, the Shadow Brokers released material that included NSA-created exploit tools.

However, it found no takers for these exploits when they were put up for sale.

In October, Shadow Brokers released  a list of servers in various countries which had been compromised by the NSA for use in staging attacks.

In the overnight dump, a table of backdoors for servers, mostly in Europe, Asia and South America was published on GitHub by the Shadow Brokers.

In its message, the Shadow Brokers said: "Respectfully, what the f*** are you doing?TheShadowBrokers voted for you. TheShadowBrokers supports you. TheShadowBrokers is losing faith in you. Mr. Trump helping theshadowbrokers, helping you. Is appearing you are abandoning 'your base', 'the movement', and the peoples who getting you elected."

To support its claims, it said the evidence for this lay in:

"Goldman Sach (TheGlobalists) and Military Industrial Intelligence Complex (MIIC) cabinet;
"Backtracked on Obamacare;
"Attacked the Freedom Causcus (TheMovement);
"Removed Bannon from the NSC; and
"Increased US involvement in a foreign war (Syria Strike)."


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.


Popular News




Sponsored News