{"id":7352,"date":"2017-04-14T11:10:02","date_gmt":"2017-04-14T19:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/14\/news-1143\/"},"modified":"2017-04-14T11:10:02","modified_gmt":"2017-04-14T19:10:02","slug":"news-1143","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/14\/news-1143\/","title":{"rendered":"ShadowBrokers releases more stolen information"},"content":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Fri, 14 Apr 2017 18:03:09 +0000<\/strong><\/p>\n<p>ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer.\u00a0 As you may recall from our <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-fails-to-collect-1m-bitcoins-releases-stolen-information\/\">earlier publications<\/a>, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.<\/p>\n<p>The dump of information released today contains a number of exploits and Windows binary files that were not seen with the previous collection of information.\u00a0 While the \u2018Auction\u2019 file may have contained obsolete exploits and information, this new release appears to contain much more recent and current data including 0-Day exploits.\u00a0 While we haven\u2019t had time to fully review the information, Twitter user <a href=\"https:\/\/twitter.com\/hackerfantastic\/status\/852915886650527744\">HackerFantastic<\/a> has already reported a successful 0-day exploit on Windows 2008 Server.<\/p>\n<div id=\"attachment_17526\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17526 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew1-600x438.jpg\" alt=\"\" width=\"600\" height=\"438\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew1-600x438.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew1-300x219.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew1.jpg 1058w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">HackerFantastic showing exploit against Windows 2008<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div id=\"attachment_17527\" style=\"width: 310px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17527 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew2-300x177.png\" alt=\"\" width=\"300\" height=\"177\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew2-300x177.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew2.png 513w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p class=\"wp-caption-text\">NSA-FTS327 USA USA strings located<\/p>\n<\/div>\n<p>One bit of information we have already uncovered are \u2018Author\u2019 tags located on some of the document files.\u00a0 These tags contain reference to a string: NSA-FTS327.This string appears in a number of NSA Organizational documents and appears to be related to the Requirements and Targeting office.\u00a0 The Snowden Surveillance Archive identifies the Requirements and Targeting office designation as FTS327, and provides a document authored by NSA\u2019s Texas TAO, Requirements and Targeting office suggesting that Computer Network exploitation was used to exploit a weakness in Mexican President Felipe Calderon\u2019s public email.\u00a0 The program used the code name of \u2018FlatLiquid\u2019.\u00a0 While no mention of that particular string has been in this dump, if the Author string found on the documents is accurate, then that would suggest there may be validity in the claims that these are NSA tools.<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_17528\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17528 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew3-600x426.png\" alt=\"\" width=\"600\" height=\"426\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew3-600x426.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew3-300x213.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/ShadowBrokerNew3.png 1282w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\">Screenshot of Snowden Surveillance Archive showing the FTS327 designation.<\/p>\n<\/div>\n<p>There is lots of information to sift through in this dump before researchers have an idea to the scope of the release, and it may take several days for a full analysis of the information has been completed. \u00a0If there are active 0-Days, we will see software manufactures scramble to release timely patches to help thwart almost certain use of this code by malicious actors in the \u2018residential\u2019 business of malware infection \u2013 as we saw with Microsoft earlier this week in regards to the Office 0-Day that was circulating via spam.<\/p>\n<p>We are currently analyzing the roughly 1000 Windows binaries that were included, and if necessary, will be pushing any needed updated before I even finish proofing this blog entry.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-releases-more-stolen-information\/\">ShadowBrokers releases more stolen information<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-releases-more-stolen-information\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Fri, 14 Apr 2017 18:03:09 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-releases-more-stolen-information\/' title='ShadowBrokers releases more stolen information'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/shutterstock_294978146.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>ShadowBrokers shocked the security world again today by releasing another cache of exploits, files, and operational documents purportedly stolen from Equation Group last summer.  As you may recall from our earlier publications, Equation Group is reportedly a clandestine hacking group that has been linked with NSA hacking tools.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/hacking\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cia\/\" rel=\"tag\">CIA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/more-information\/\" rel=\"tag\">more information<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa\/\" rel=\"tag\">NSA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nsa-fts327\/\" rel=\"tag\">NSA-FTS327<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/release\/\" rel=\"tag\">release<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/shadowbrokers\/\" rel=\"tag\">ShadowBrokers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/snowden\/\" rel=\"tag\">snowden<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/windows\/\" rel=\"tag\">windows<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-releases-more-stolen-information\/' title='ShadowBrokers releases more stolen information'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/shadowbrokers-releases-more-stolen-information\/\">ShadowBrokers releases more stolen information<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[6626,4503,10987,3919,12001,10626,12002,12003,11932,11457,10525],"class_list":["post-7352","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cia","tag-cybercrime","tag-exploits","tag-hacking","tag-more-information","tag-nsa","tag-nsa-fts327","tag-release","tag-shadowbrokers","tag-snowden","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7352"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7352\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}