Shadow Brokers Release Secret List Of NSA-Compromised Servers

The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking tools and exploits, is back with a Bang!

The group suspected of having ties to Russia has released a list of servers in various countries which have been compromised by the NSA for use in staging attacks and suggested that the best outcome for the US presidential election might be stopping it altogether.

Shadow Brokers, which released a dump of material earlier this year from the Equation Group that contained NSA-created exploit tools, which has long been suspected of being an NSA front organisation, also issued a long, rambling message in English that appears to be deliberately mangled.

The list of compromised servers, once again obtained from the Equation Group, shows servers in many countries: Japan, South Korea, Belgium, India, Hungary, Mexico, Spain, Poland, Germany, Sweden, China, Greece, Finland, Chile, Taiwan and many more.

The Shadow Brokers also released the means to gain entry to any of these servers. A total of 306 were listed.

Security researcher Mustafa Al-Bassam, a former member of Lulzsec and the Anonymous hacking collective, commented on Twitter that all of the target servers had been compromised between 2000 and 2010, adding that it was likely that most had been cleaned up unless they had disk back-ups.

He observed that most of the servers seemed to be running versions of Solaris. A few were running Linux or FreeBSD.

"So even the NSA hacks machines from compromised servers in China and Russia. This is why attribution is hard," Bassam wrote.

In its message, Shadow Brokers asked why the US was looking to wage a cyber war on Russia using the CIA and not the NSA or the Cyber Command.

It poked fun at the American election process, questioning how everyone could be said to have equal power at the ballot box when different people had vastly different sums at their command to influence the polls.

Shadow Brokers suggested that the best way to influence the polls was not by keeping away, but rather by stopping the elections altogether.

"TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being Grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016," the group wrote.

"If peoples are not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking, disrupting, smashing equipment, tearing up ballots?

"The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t believing? Remembering Iran elections? Remembering Stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?"

Ein News:            TheHackerNews:         Snowden: NSA Hacking Tools Leak Is ‘a warning’:

 

 

« UK To Increase National Cyber Defences
GCHQ’s Cyber Insiders Summer School »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

Cyber Zones

Cyber Zones

Cyber Zones is a leading provider of penetration test services, RED team assessment services, digital forensics and IT security consulting.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.