Shadow Brokers Release New Batch of Files Containing Windows and SWIFT Exploits

Discussion in 'malware problems & news' started by itman, Apr 14, 2017.

  1. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    +1:thumb:

    Good observation.
     
  2. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499

    Maybe China slapped their War happy fingers?
     
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    I don't know how some researchers did their tests - saying exploits are good? They conducted tests on unpatched systems?

    Since vulnerabilities were patched in March updates, we can assume that somebody shared them with MS before they got released.
     
  4. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "...Those fears appear to have been prompted by experts using even slightly out-of-date versions of Windows in their labs. One of Microsoft's fixes, also called a patch, was only released last month .

    'I missed the patch," said British security architect Kevin Beaumont, jokingly adding, "I'm thinking about going to live in the woods now...'

    Beaumont wasn't alone. Matthew Hickey, of cybersecurity firm Hacker House, also ran the code against earlier versions of Windows on Friday. But he noted that many organizations put patches off, meaning 'many servers will still be affected by these flaws... ' "

    https://phys.org/news/2017-04-microsoft-users-alleged-nsa-malware.html

    If you look through the initial reports in the posts above you will see that Beaumont and Hickey were at the forefront of scaring Windows users. Hickey even got Snowden fooled.

    Confucius say: Man who eat breakfast upside down end up with egg on face!
     
    Last edited: Apr 15, 2017
  5. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,145
    Location:
    Texas
    Protecting customers and evaluating risk
     
  6. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,549
    Location:
    Triassic
    Maybe this is what kept Microsoft busy in February - there were no patches for any version of Windows and they refused to give an explanation. The exploits were addressed in the March patches. Feasible?
     
  7. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,145
    Location:
    Texas
    Very feasible.
     
  8. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Maybe. As I remember it was something they found last minute that kept them from releasing updates in February. But why wouldn't they release other updates in February and then updates for exploits in March?
     
  9. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    0-day exploits sell for $10,000+: http://cybersec.buzz/darknet-deep-web-zero-day-exploits/ . With that kid of money involved, you would have to be an complete idiot to give one away for free.

    I believe the Shadow Broker folks might be studying "chaos theory" these days ...............
     
  10. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    The "Shadow Broker" is a character type in the PC game "Mass Effect." I suspect it is this character that inspired The Shadow Brokers' name. The questions about it's suitability are obvious:

    "The Shadow Broker is an individual at the head of an expansive organization which trades in information, always selling to the highest bidder. The Shadow Broker appears to be highly competent at its trade: all secrets that are bought and sold never allow one customer of the Broker to gain a significant advantage, forcing the customers to continue trading information to avoid becoming disadvantaged, allowing the Broker to remain in business...

    ...The Shadow Broker's identity is unknown to the general public in 2183; the Broker always operates through an agent. Barla Von refers to the Broker as "he" for convenience's sake, but tells Commander Shepard that he believes the Shadow Broker is a group of individuals: it does not seem possible for a single individual to monitor all of the available information and have such a wide sphere of influence...

    Some of the Broker's resources are scattered across the galaxy, awaiting discovery."

    http://masseffect.wikia.com/wiki/Shadow_Broker
     
    Last edited: Apr 15, 2017
  11. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,873
    Location:
    Outer space
    Hmm, MS says it was already patched but then there's reports telling explicitly with this months updates some Windows versions are still vulnerable:

     
  12. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    Windows Central, the source for the quote cited has this to say today:

    "...We're unsure why we (and plenty of others) were still able to exploit up to date versions of Windows 7 and Server 2012.

    However, our advice still stands: Use the latest software, install updates when they become available, and be mindful of your internet activities and what software you install. The original text of our article follows..."

    http://www.windowscentral.com/everything-you-need-know-about-latest-shadowbrokers-dump?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+wmexperts+(Windows+Central)
     
  13. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    http://news.softpedia.com/news/shadow-brokers-dump-nsa-files-showing-swift-infiltration-514938.shtml
     
  14. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    The new shadow brokers leak connects the NSA to the stuxnet cyber weapon used on Iran
    http://treason.news/2017-04-17-the-...to-the-stuxnet-cyber-weapon-used-on-iran.html
     
  15. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  16. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    AES-NI Ransomware Dev Claims He's Using Shadow Brokers Exploits
    https://www.bleepingcomputer.com/ne...dev-claims-hes-using-shadow-brokers-exploits/
     
  17. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Script kiddies pwn 1000s of Windows boxes using leaked NSA hack tools
    https://www.theregister.co.uk/2017/04/21/windows_hacked_nsa_shadow_brokers/
     
    Last edited: Apr 21, 2017
  18. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://www.bleepingcomputer.com/ne...ters-infected-with-nsas-doublepulsar-malware/
     
  19. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
  20. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  21. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Yes, also this:
     
  22. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Shadow Brokers Attack Tools Light Up Chinese and Russian Darknet
    https://www.infosecurity-magazine.com/news/shadow-brokers-attack-tools-china/
     
  23. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  24. guest

    guest Guest

    Kaspersky identifies mysterious APT mentioned in 2017 Shadow Brokers leak
    November 5, 2019
    https://www.zdnet.com/article/kaspe...us-apt-mentioned-in-2017-shadow-brokers-leak/
    Kaspersky: DarkUniverse – the mysterious APT framework #27
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.