It seems the NSA has been hacked! According to foreign media reports, the "Equation Group" working for the US National Security Agency (NSA) was recently attacked by hackers, and a hacker group calling itself "The Shadow Brokers" claimed responsibility for the incident. Some cybersecurity experts who study leaked data, vulnerabilities and hacker tools believe that the attack is very likely to be real. Not only that, the hackers who call themselves "Shadow Brokers" also demanded 1 million Bitcoins (about $568 million) to release the "best" cyber attack weapons and more files. According to a 2015 report by security firm Kaspersky, the NSA's Equation Group was described as "exceeding any known group in terms of technical sophistication and having been active for nearly two decades". The Equation Group has also been linked to the previously infamous Regin and Stuxnet worms, which were allegedly hacker attacks launched by the United States, although this has not been absolutely proven. Two days ago, the Shadow Brokers posted some documents on Github (deleted) and Tumblr (deleted) that they said were from the Equation Group. Most of the files contained installation scripts, command-and-control server configurations, and exploits purportedly targeting U.S. router and firewall manufacturers, including Cisco, Juniper, and Fortinet. According to the leaked documents, Chinese company Topsec was also a target of the Equation Group. The leaked documents mention some of the file names mentioned by Edward Snowden, such as "BANANAGLEE" and "EPICBANANA."
It has not yet been confirmed whether the leaked documents are authentic, but some security experts believe that it is very likely. “We haven’t tested these exploits, but they certainly look like valid exploits,” Matt Suiche, founder of UAE-based cybersecurity firm Comae Technologies, told the Daily Dot. While some say the leaked documents could be a very elaborate scam, the so-called Bitcoin auction is just a distraction to attract media attention.
If the NSA has been successfully hacked, then this hacking incident will be a very critical cybersecurity incident. |
<<: Developing Ethereum applications based on Ruby-on-Rails
Different people are born in different years, whi...
In China, many people want to do charity, but the...
There are many lines in our palms, including misc...
Moles in different positions will have an impact ...
Most people have beautiful expectations for marri...
Bianews reported that today, the Hangzhou Interne...
As one of the traditional physiognomy techniques, ...
This article was originally written by IPFS Force...
What are the specific features of a good person? ...
The forehead is very important in physiognomy. Th...
Anyone can have Fuzi eyes on their hands. Even th...
Evil moles are also called dead moles. They will ...
Forehead wrinkles are a type of facial feature th...
Recently, according to the deployment of the Mini...
Nearly 60% of Ethereum miners have upgraded to su...