Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Snowden Documents Show NSA Leak is Real: Report

Previously unpublished documents released by former National Security Agency contractor Edward Snowden confirm that some of the spy agency’s top-secret code has been leaked or hacked, The Intercept reported Friday.

Previously unpublished documents released by former National Security Agency contractor Edward Snowden confirm that some of the spy agency’s top-secret code has been leaked or hacked, The Intercept reported Friday.

The online news site’s editors include journalists that worked with Snowden to publicize his notorious 2013 NSA leak revealing the extent of government snooping on private data.

The Intercept said Snowden had given the site a classified draft NSA manual on how to implant malware — malicious code that is used to monitor or control someone else’s computer.

Whether code published online by a mysterious group called “Shadow Brokers” is genuine has been the source of much debate in recent days.

The NSA has steadfastly declined to comment on whether it has been the victim of a security breach.

Over the weekend, the Shadow Brokers posted two sets of files, one that is freely accessible and another that remains encrypted.

They said they would release this additional information subject to raising one million Bitcoins — digital currency, in this case worth about $575 million — through an online auction.

According to the Intercept, the draft NSA manual contains instructions to NSA operators telling them to use a specific string of characters associated with the SECONDDATE malware program.

Advertisement. Scroll to continue reading.

The exact same characters appear throughout parts of the Shadow Brokers leak, the Intercept said.

According to The New York Times, much of the code was created to peer through the computer firewalls of foreign powers like China, Iran and Russia.

Such access would enable the NSA to plant malware in rivals’ systems and monitor — or even attack — their networks.

Whoever obtained the code would have had to break into NSA servers that store the files, the Times said.

Related: Cisco finds zero-day vulnerability leaked by Shadow Brokers

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...