The NSA told Microsoft about EternalBlue hack used in WannaCry

Share

Their claims has yet to be verified, however, the hacking group has so far disclosed significant information using hacking tools stolen from the U.S. National Security Agency. They released NSA's hacking tools which was the main reason behind those attacks.

It also threatened to release compromised data from the worldwide banking network and secret information on the nuclear and missile programs of Russia, China, Iran or North Korea. "This is always being about theshadowbrokers vs theequationgroup", they said.

The Shadow Brokers released a cache of tools, including EternalBlue, which was then used in the WannaCry ransomware.

Although it is still unclear as to what operating systems would come under attack following the release of new malware, the reports had it that Microsoft Windows 10 would possibly be the target.

The group also says the EternalBlue exploit is not a "zero-day one' (this kind of bug or vulnerability is something which has never been discovered before), but rather says the security patch was available for 30 days, before they decide to dump the data to the public".

"ShadowBrokers are back" tweeted Matthieu Suiche, a French hacker and founder of the United Arab Emirates-based cyber security firm Comae Technologies, who has studied the Shadow Broker releases and believes the group has access to NSA files.

More news: Sweden postpones football game after match fixing attempt

"Is being like wine of month club", they wrote in broken English.

Now, the same group is threatening to release even more hacking tools on the internet, which are part of a larger collection of exploits that they claim they stole past year from another hacker group that is believed to have been affiliated with the NSA.

In the same jibberish rant, it has also been mentioned that the hacker group is now planning to follow a monthly data dump cycle.

Even though the crooks behind the real WannaCry infection are still unknown, one thing is certain and this is the fact that Shadow Brokers stole the malware from the NSA.

However, commentators state that the NSA "got lucky", as The Shadow Brokers appeared to have the exploit months before Microsoft was able to patch it. It condems them for not buying the exploits in the past and has given them another chance to purchase the entire stolen data dump before it starts to auction on the dark web, in parts.

Share