Shadow Brokers Release Secret List Of NSA-Compromised Servers

The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking tools and exploits, is back with a Bang!

The group suspected of having ties to Russia has released a list of servers in various countries which have been compromised by the NSA for use in staging attacks and suggested that the best outcome for the US presidential election might be stopping it altogether.

Shadow Brokers, which released a dump of material earlier this year from the Equation Group that contained NSA-created exploit tools, which has long been suspected of being an NSA front organisation, also issued a long, rambling message in English that appears to be deliberately mangled.

The list of compromised servers, once again obtained from the Equation Group, shows servers in many countries: Japan, South Korea, Belgium, India, Hungary, Mexico, Spain, Poland, Germany, Sweden, China, Greece, Finland, Chile, Taiwan and many more.

The Shadow Brokers also released the means to gain entry to any of these servers. A total of 306 were listed.

Security researcher Mustafa Al-Bassam, a former member of Lulzsec and the Anonymous hacking collective, commented on Twitter that all of the target servers had been compromised between 2000 and 2010, adding that it was likely that most had been cleaned up unless they had disk back-ups.

He observed that most of the servers seemed to be running versions of Solaris. A few were running Linux or FreeBSD.

"So even the NSA hacks machines from compromised servers in China and Russia. This is why attribution is hard," Bassam wrote.

In its message, Shadow Brokers asked why the US was looking to wage a cyber war on Russia using the CIA and not the NSA or the Cyber Command.

It poked fun at the American election process, questioning how everyone could be said to have equal power at the ballot box when different people had vastly different sums at their command to influence the polls.

Shadow Brokers suggested that the best way to influence the polls was not by keeping away, but rather by stopping the elections altogether.

"TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being Grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016," the group wrote.

"If peoples are not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking, disrupting, smashing equipment, tearing up ballots?

"The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t believing? Remembering Iran elections? Remembering Stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?"

Ein News:            TheHackerNews:         Snowden: NSA Hacking Tools Leak Is ‘a warning’:

 

 

« UK To Increase National Cyber Defences
GCHQ’s Cyber Insiders Summer School »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Cyber Security Canada

Cyber Security Canada

Cyber Security Canada is an accredited Certification Body for government-backed Cyber Security Certification Programs, designed specifically for small and medium-sized Canadian businesses.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.