It seems the NSA has been hacked! According to foreign media reports, the "Equation Group" working for the US National Security Agency (NSA) was recently attacked by hackers, and a hacker group calling itself "The Shadow Brokers" claimed responsibility for the incident. Some cybersecurity experts who study leaked data, vulnerabilities and hacker tools believe that the attack is very likely to be real. Not only that, the hackers who call themselves "Shadow Brokers" also demanded 1 million Bitcoins (about $568 million) to release the "best" cyber attack weapons and more files. According to a 2015 report by security firm Kaspersky, the NSA's Equation Group was described as "exceeding any known group in terms of technical sophistication and having been active for nearly two decades". The Equation Group has also been linked to the previously infamous Regin and Stuxnet worms, which were allegedly hacker attacks launched by the United States, although this has not been absolutely proven. Two days ago, the Shadow Brokers posted some documents on Github (deleted) and Tumblr (deleted) that they said were from the Equation Group. Most of the files contained installation scripts, command-and-control server configurations, and exploits purportedly targeting U.S. router and firewall manufacturers, including Cisco, Juniper, and Fortinet. According to the leaked documents, Chinese company Topsec was also a target of the Equation Group. The leaked documents mention some of the file names mentioned by Edward Snowden, such as "BANANAGLEE" and "EPICBANANA."
It has not yet been confirmed whether the leaked documents are authentic, but some security experts believe that it is very likely. “We haven’t tested these exploits, but they certainly look like valid exploits,” Matt Suiche, founder of UAE-based cybersecurity firm Comae Technologies, told the Daily Dot. While some say the leaked documents could be a very elaborate scam, the so-called Bitcoin auction is just a distraction to attract media attention.
If the NSA has been successfully hacked, then this hacking incident will be a very critical cybersecurity incident. |
<<: Developing Ethereum applications based on Ruby-on-Rails
What is the fate of people with moles on the sole...
Recently, Ethereum developer Marius van der Wijde...
Fidelity Digital Assets, a subsidiary of asset ma...
The price of Bitcoin soared sharply in the Asian ...
The relationship between beard and personality in...
What are the characteristics of a lustful face? 1...
Our facial features will change, and different fa...
The most lucky woman in love It is a cliché to pr...
The invention of Bitcoin in 2008 marked the begin...
In real life, a person's face is the first im...
Looking at our eyebrows, each person has his own ...
We are very familiar with moles, which can be fou...
The good or bad fortune can be seen from the face...
There are many outstanding women in today's s...
Anyone who has learned about palmistry basically ...