ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Evidence Links Leaked Hacking Tools to the NSA | #CyberSecurity #Cyberespionage #ShadowBrokers

Evidence Links Leaked Hacking Tools to the NSA | #CyberSecurity #Cyberespionage #ShadowBrokers | ICT Security-Sécurité PC et Internet | Scoop.it
More evidence surfaced this week that computer surveillance tools belonging to the mysterious Equation hacking group are linked to the US National Security Agency.

Cyber-security experts were divided on the origin of the hacking code, which was leaked on Monday by another hacking group called calling itself the "Shadow Brokers." But The Intercept reported on Friday that a specific 16-character string found in a leaked NSA instruction manual also appears in the Shadow Brokers code.

The manual, a 31-page document entitled "FOXACID SOP for Operational Management," describes administrative tools for tracking surveillance targets, including a set of tags used to catalogue servers, according to The Intercept. The tags are used to trick Internet users into thinking they're browsing a safe website when in fact they've been sent a malicious payload from an NSA server.

Although it appears to show a link between the Shadow Brokers hack and the NSA, The Intercept acknowledges its findings don't necessarily mean that the NSA itself was hacked. The code could have been stolen from third-party hackers, a possibility Edward Snowden alluded to on Monday.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
More evidence surfaced this week that computer surveillance tools belonging to the mysterious Equation hacking group are linked to the US National Security Agency.

Cyber-security experts were divided on the origin of the hacking code, which was leaked on Monday by another hacking group called calling itself the "Shadow Brokers." But The Intercept reported on Friday that a specific 16-character string found in a leaked NSA instruction manual also appears in the Shadow Brokers code.

The manual, a 31-page document entitled "FOXACID SOP for Operational Management," describes administrative tools for tracking surveillance targets, including a set of tags used to catalogue servers, according to The Intercept. The tags are used to trick Internet users into thinking they're browsing a safe website when in fact they've been sent a malicious payload from an NSA server.

Although it appears to show a link between the Shadow Brokers hack and the NSA, The Intercept acknowledges its findings don't necessarily mean that the NSA itself was hacked. The code could have been stolen from third-party hackers, a possibility Edward Snowden alluded to on Monday.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame | #Cyberwar #Cyberespionage

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame | #Cyberwar #Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:

We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:

We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

"Shadow Brokers": Veröffentlichte NSA-Hackersoftware ist offenbar echt | #Cybercrime #CyberSecurity #Cyberespionage

"Shadow Brokers": Veröffentlichte NSA-Hackersoftware ist offenbar echt | #Cybercrime #CyberSecurity #Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
US-Sicherheitsexperten und frühere NSA-Mitarbeiter befinden die Software, die Unbekannte am Wochenende veröffentlichten, als echt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
US-Sicherheitsexperten und frühere NSA-Mitarbeiter befinden die Software, die Unbekannte am Wochenende veröffentlichten, als echt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA hacked? Top cyber weapons allegedly go up for auction | #Cybercrime #Cyberespionage #CyberWeapons

NSA hacked? Top cyber weapons allegedly go up for auction | #Cybercrime #Cyberespionage #CyberWeapons | ICT Security-Sécurité PC et Internet | Scoop.it
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/

 

Gust MEES's insight:
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden: NSA hack is likely a warning from Russia | #Cyberwar #CyberSecurity #Cyberespionage #ShadowBrokers

Snowden: NSA hack is likely a warning from Russia | #Cyberwar #CyberSecurity #Cyberespionage #ShadowBrokers | ICT Security-Sécurité PC et Internet | Scoop.it

Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.

 

Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.

 

The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

 

Gust MEES's insight:

Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.

 

Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.

 

The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden Documents Confirm the NSA Hack Is Real | #Cyberespionage #Cybercrime #CyberSecurity #Cyberwar #CyberWarfare

Snowden Documents Confirm the NSA Hack Is Real | #Cyberespionage #Cybercrime #CyberSecurity #Cyberwar #CyberWarfare | ICT Security-Sécurité PC et Internet | Scoop.it
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

Gust MEES's insight:
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacking group claims to offer cyber-weapons in online auction | #Cybercrime #Cyberespionage 

Hacking group claims to offer cyber-weapons in online auction | #Cybercrime #Cyberespionage  | ICT Security-Sécurité PC et Internet | Scoop.it
Hackers going by the name Shadow Brokers said on Monday they will auction stolen surveillance tools they say were used by a cyber group linked to the U.S. National Security Agency.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
Hackers going by the name Shadow Brokers said on Monday they will auction stolen surveillance tools they say were used by a cyber group linked to the U.S. National Security Agency.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

 

No comment yet.