{"id":7297,"date":"2017-04-10T10:10:15","date_gmt":"2017-04-10T18:10:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/10\/news-1088\/"},"modified":"2017-04-10T10:10:15","modified_gmt":"2017-04-10T18:10:15","slug":"news-1088","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/10\/news-1088\/","title":{"rendered":"ShadowBrokers fails to collect 1M bitcoins \u2013 releases stolen information"},"content":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Mon, 10 Apr 2017 17:49:20 +0000<\/strong><\/p>\n<p>ShadowBrokers finally made good on their promise to release the decryption key to unlock the stolen &#8216;auction&#8217; file purportedly filled with NSA hacking tools.<\/p>\n<p>Over the weekend, the hacking group ShadowBrokers released the decryption key for the \u2018auction\u2019 file that was included in the dump of information from last summer that the group claimed they <em>acquired<\/em> from Equation Group \u2013 reportedly a well-known hacking team responsible for highly sophisticated malware campaigns such as Flame and Stuxnet and possibly associated with certain 3-letter government agencies.<\/p>\n<p>While the group\u2019s <em>get-rich-quick<\/em> plan to sell the auction file for the astronomical asking price of 1M bitcoins (roughly $1,186,510,000.00 US Dollar as of today) may have ended with spectacular failure, the team has made good on their promise to ultimately release the stolen information should the requested payoff not be received. It\u2019s difficult, if not impossible for us to verify the claims from the hackers or to place attribution to the appropriate group, but there are interesting bits of information contained within the archive and we will document some of the early discoveries here.<\/p>\n<p>The release of the key came in a highly politicized tirade directed to President Donald Trump touching on everything from Obamacare and Goldman Sachs, to Syria, Steven Bannon, and John McCain. The epic rant discusses the Alien and Sedition Act of 1798, Social Collectivism, White Privilege, Russia, and even Magog (<em>I had to look it up too.<\/em>\u00a0<em>It seems most applicable to the Islam interpretation of the word. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Magog_(Bible)\" target=\"_blank\">Courtesy of Wikipedia<\/a><\/em>). For the inference of being American citizens and in the eyes of any High School English teacher, it\u2019s a <a href=\"https:\/\/medium.com\/@shadowbrokerss\/dont-forget-your-base-867d304a94b1?source=user_profile---------1-----------\" target=\"_blank\">cringe-worthy read<\/a> filled with grammatical, spelling, and punctuation errors (<em>although,\u00a0good use of the Oxford comma<\/em>), and seems to use a variety of written dialects and cultural references throughout. All of which appear to be deliberate false-flags to help conceal the identity of the person\/group associated with the original attack.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers1.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17381\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers1.png\" alt=\"\" width=\"552\" height=\"393\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers1.png 741w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers1-300x214.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers1-600x428.png 600w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3>Exploits<\/h3>\n<p>There are a number of tools in the dump with notes and code that indicate possible exploits against various software and products. A majority of the files seem to target Linux and Solaris-based servers. Though many of the exploits are dated from many years ago, some as far back as 2003, it\u2019s possible they are still usable on legacy systems. While we can\u2019t confirm the authenticity of the following exploits, we will provide a small snippet from the collection below.<\/p>\n<p><em>ElatedMonkey<\/em> is a local privilege escalation exploit against the cPanel Remote Management Web interface current through at least version 24:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers2.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\".aligncenter { border: 5px solid #dbdbdb; display: block; margin: 0 auto; width: 300px; } aligncenter wp-image-17382\" title=\".aligncenter { border: 5px solid #dbdbdb; display: block; margin: 0 auto; width: 300px; }\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers2.png\" alt=\"\" width=\"534\" height=\"263\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers2.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers2-300x148.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers2-600x295.png 600w\" sizes=\"auto, (max-width: 534px) 100vw, 534px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>ElginGamble<\/em> is a \u2018public\u2019 vulnerability affecting Linux 2.6.13 \u2013 2.6.17.4 to create a cron script capable of spawning a root shell:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers3.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17383\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers3.png\" alt=\"\" width=\"573\" height=\"195\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers3.png 754w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers3-300x102.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers3-600x205.png 600w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>PTrace\/ForkPTY<\/em> is a kernel exploit affecting Linux 2.2 \u2013 2.4:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers4.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17384\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers4.png\" alt=\"\" width=\"580\" height=\"299\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers4.png 690w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers4-300x155.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers4-600x310.png 600w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>EngageNaughty<\/em> is an Apache and SSL exploit:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers5.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17385\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers5.png\" alt=\"\" width=\"776\" height=\"333\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers5.png 1127w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers5-300x129.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers5-600x258.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers5-195x85.png 195w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>EasyStreet<\/em> appears to be some sort of UDP exploit utilizing sendmail:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers6.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17386\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers6.png\" alt=\"\" width=\"539\" height=\"386\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers6.png 714w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers6-300x215.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers6-600x430.png 600w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>EBBSHAVE<\/em> is a vulnerability affecting Solaris RPC services version 2.10:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers7.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17387\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers7.png\" alt=\"\" width=\"665\" height=\"293\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers7.png 786w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers7-300x132.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers7-600x264.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers7-195x85.png 195w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>EXCELBERWICK<\/em> is a remote exploit against xmlrpc.php on Unix based systems:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers8.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17388\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers8.png\" alt=\"\" width=\"520\" height=\"325\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers8.png 629w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers8-300x187.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers8-600x375.png 600w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Tools<\/strong><\/h3>\n<p>Aside from the partial selection of exploits posted above, the dump also contains a number of tools, utilities, and scripts to deploy once successful exploitation of the system occurs.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Strifeworld<\/em> is a TCP session recorder that dates from 2001:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers9.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17389\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers9.png\" alt=\"\" width=\"541\" height=\"83\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers9.png 704w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers9-300x46.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers9-600x92.png 600w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>EndlessDonut<\/em> helps deploy monitoring agents and to maintain a clean record:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers10.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17390\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers10.png\" alt=\"\" width=\"518\" height=\"279\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers10.png 668w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers10-300x162.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers10-600x323.png 600w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>Ys.auto<\/em> is an encompassing script that assists with the deployment of various RATs and system monitors. It\u2019s a curious footnote that the Ford Motor Company IP address appears within a number of files under the \u2018example\u2019 section:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers11.png\" data-rel=\"lightbox-10\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17391\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers11.png\" alt=\"\" width=\"545\" height=\"356\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers11.png 774w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers11-300x196.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers11-600x392.png 600w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><em>ELECTRICSLIDE.pl<\/em> is a PERL script, that as pointed out by <a href=\"https:\/\/twitter.com\/x0rz\/status\/850738475104165888\" target=\"_blank\">x0rz<\/a>, impersonates a Chinese browser with a fake accept-language:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers12.png\" data-rel=\"lightbox-11\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17392\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers12.png\" alt=\"\" width=\"570\" height=\"227\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers12.png 675w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers12-300x120.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers12-600x239.png 600w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>A number of documents reference the deployment of RATs (Remote Access Trojans) to compromised machines. The vast majority of these files appear to target various Solaris, Linux, and FreeBSD clients &#8211; just based off their naming conventions. Additional analysis of these files will surely be published in coming days:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers13.png\" data-rel=\"lightbox-12\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17393\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers13.png\" alt=\"\" width=\"751\" height=\"122\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers13.png 1017w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers13-300x49.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers13-600x97.png 600w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>There also appears to be a number of tools, documents, or scripts that reference cell phone information.<\/p>\n<p><em>Cdrprint.pl<\/em> is a script that takes CDR records and makes them pretty. CDR records are data records that are created when call information or other telecommunications transactions (text messages) passes through a processing facility or device. These are accompanied by \u2018definition\u2019 files, which to the best of my understanding, helps parse the collected data for specific phones:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers14.png\" data-rel=\"lightbox-13\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17394\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers14.png\" alt=\"\" width=\"456\" height=\"101\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers14.png 574w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers14-300x66.png 300w\" sizes=\"auto, (max-width: 456px) 100vw, 456px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers15.png\" data-rel=\"lightbox-14\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17395\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers15.png\" alt=\"\" width=\"448\" height=\"612\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers15.png 655w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers15-219x300.png 219w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers15-439x600.png 439w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Within the targets.py file, there are strings and IP addresses relating to the Russian division of Sprint Telecom:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers16.png\" data-rel=\"lightbox-15\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17396\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers16.png\" alt=\"\" width=\"568\" height=\"209\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers16.png 668w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers16-300x110.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers16-600x221.png 600w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The information contained in this dump is extensive and it will take security researchers some time to digest. While many of the exploits appear to be public and quite old, it\u2019s not out of the realm of possibility these vulnerabilities aren\u2019t still useful on legacy systems.<\/p>\n<p>But after spending ample time on a weekend pouring over the data, I fail to find the value in ShadowBrokers initial asking price of 1M bitcoins for an archive filled with publicly known (and probably patched) vulnerabilities dating as far back as 2003. Nothing appears to be more recent than 2013, so the information is likely obsolete and possibly not even used. This appears to be either a massive failure on the part of ShadowBrokers or a giant prank done for the lulz as there is no way they could have possibly thought this sort of information was worth anywhere near what was being asked.<\/p>\n<p>Regardless, another public disclosure of valuable information reminds us once again the value in OPSEC and secure data retention.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-fails-to-collect-1m-bitcoins-releases-stolen-information\/\">ShadowBrokers fails to collect 1M bitcoins \u2013 releases stolen information<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-fails-to-collect-1m-bitcoins-releases-stolen-information\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Mon, 10 Apr 2017 17:49:20 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-fails-to-collect-1m-bitcoins-releases-stolen-information\/' title='ShadowBrokers fails to collect 1M bitcoins \u2013 releases stolen information'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokers17-2.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>ShadowBrokers finally made good on their promise to release the decryption key to unlock the stolen &#8216;auction&#8217; file purportedly filled with NSA hacking tools.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/hacking\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/equation-group\/\" rel=\"tag\">Equation Group<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hack\/\" rel=\"tag\">hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacking\/\" rel=\"tag\">hacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa\/\" rel=\"tag\">NSA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/opsec\/\" rel=\"tag\">opsec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/president-trump\/\" rel=\"tag\">President Trump<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/shadowbrokers\/\" rel=\"tag\">ShadowBrokers<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-fails-to-collect-1m-bitcoins-releases-stolen-information\/' title='ShadowBrokers fails to collect 1M bitcoins \u2013 releases stolen information'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-fails-to-collect-1m-bitcoins-releases-stolen-information\/\">ShadowBrokers fails to collect 1M bitcoins \u2013 releases stolen information<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,11563,10987,4980,3919,10626,11326,1555,11932],"class_list":["post-7297","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-equation-group","tag-exploits","tag-hack","tag-hacking","tag-nsa","tag-opsec","tag-president-trump","tag-shadowbrokers"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7297"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7297\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}