In 2016, a group called the Shadow Brokers appeared out of nowhere and dropped a digital bomb on the security world. They leaked a collection of cyber tools believed to come from the NSA’s elite hacking unit known as the Equation Group. Inside were exploits that could silently take over systems across the internet. Among them was EternalBlue, which later powered massive attacks like WannaCry and NotPetya, taking down hospitals, shipping lines, and entire networks within hours.

The leaks exposed the hidden world of state level hacking. What had once been locked inside secret agencies was suddenly free, used by anyone who could understand it. No one ever proved who the Shadow Brokers really were, but their message was clear. Even the most powerful systems can be breached, and once the code escapes, no one controls it.

#ShadowBrokers #CyberSecurity #HackingHistory #Infosec #CyberWarfare

Le retour de Flame

Flame, en mai 2012 est un programme malveillant dont le but est d’intercepter les e-mails, de collecter des fichiers et d’enregistrer des conversations à distance. Ce dernier est présumé créé par les États-Unis et Israël, en vue d'un objectif précis : retarder l'enrichissement d'uranium en Iran.
Ce pays semble mener d'une main de fer, le Moyen-Orient. Cette affaire ce cyberespionnage remonte au mois de mai 2012.« Il s’agit de préparer le champ de bataille pour un autre type d’action secrète », déclarait un ancien haut responsable du renseignement américain au The Wahington Post.

Le passé sert de référence, pour dessiner le futur d'une vie au présent, car la géopolitique du monde actuel se conçoit à travers ses cyberattaques. Roel Schouwenberg, chercheur principal chez Kaspersky Lab résumait (en 2012) ainsi la situation : « Flame a probablement été utilisé pour l'espionnage et Stuxnet pour le sabotage ».

(Crédits : Markus Spiske/Pexels)

https://librexpression.fr/flame-le-virus-fantome

https://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html

#cyberattack #databreaches #equationgroupe #Europe #flame #France #Gaza #informatique #Iran #ISNU #Israel #Librexpression #Pegasus #ransomware #Russie #shadowbrokers #USA #threats

🇨🇳 #cybersecurity firms are still using information leaked by the #ShadowBrokers (🇷🇺 GRU) to identify alleged #EquationGroup's (🇺🇸 NSA) Hacking Ops inside 🇨🇳 .

So #inversecos looked at several cybersecurity reports on 🇺🇸 APTs.

Full Report 👇
https://www.inversecos.com/2025/02/an-inside-look-at-nsa-equation-group.html

An inside look at NSA (Equation Group) TTPs from China’s lense

Interesting deep dive into FVEY malware by Kaspersky: is it ONLY a crypto miner infection?

https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/

#fvey #shadowbrokers #analysis

StripedFly: Perennially flying under the radar

Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. The amount of effort that went into creating the framework is truly remarkable, and its disclosure was quite astonishing.

Kaspersky

Whether a result of clumsiness of a bored operator or deliberate subterfuge, there are clues that the supposed NSA front Equation Group operated out of Russia. The question remains: What were they doing that for?

Reprising my 2016 article "The Possibly Russian Fingerprints on the Shadow Brokers' Trick or Treat Package", https://bsdly.blogspot.com/2016/11/the-possibly-russian-fingerprints-on.html or trackerless https://nxdomain.no/~peter/possible_russian_fingerprints_on_the_shadow_brokers_trick_or_treat_package.html #cybercrime #hacking #Russian_cybercrime #EquationGroup #ShadowBrokers #NSA #RFC1918

The Possibly Russian Fingerprints on the Shadow Brokers' Trick or Treat Package

Whether a result of clumsiness of a bored operator or deliberate subterfuge, there are clues that the supposed NSA front Equation Group ope...

Chinese Cybersecurity Company Doxes Apparent NSA Hacking Operation

A Chinese security firm released a detailed report about what it says is malware created by Equation Group, a hacking group widely believed to be the NSA.

Earlier this year, #CheckPoint Research published the story of “Jian” — an #exploit used by #Chinese threat actor #APT31 which was “heavily inspired by” an almost-identical exploit used by the #EquationGroup, made publicly known by the #ShadowBrokers leak.
https://research.checkpoint.com/2021/a-deep-dive-into-doublefeature-equation-groups-post-exploitation-dashboard/
A Deep Dive into DoubleFeature, Equation Group's Post-Exploitation Dashboard - Check Point Research

Earlier this year, Check Point Research published the story of “Jian” — an exploit used by Chinese threat actor APT31 which was “heavily inspired by” an almost-identical exploit used by the Equation Group, made publicly known by the Shadow Brokers leak. The spicy part of the story was that Jian had been roaming in the... Click to Read More

Check Point Research
EpMe et Jian : derrière le correctif remontant à 2017, des exploits “potentiellement” reliés à Équation Group ! (retour vers le 0-day…) | SOSOrdi.net - L'actualité informatique gratuite

SOSOrdi.net - L'actualité informatique gratuite
Für insgesamt 1 Million US-Dollar bietet SolarLeaks Zugang zu gestohlenen Datenschätzen. Die Echtheit ist allerdings bislang unbewiesen.
Solarwinds: Einbrecher verscherbeln Windows-Quellcode und FireEye-Angriffs-Tools
Solarwinds: Einbrecher verscherbeln Windows-Quellcode und FireEye-Angriffs-Tools

Für insgesamt 1 Million US-Dollar bietet SolarLeaks Zugang zu gestohlenen Datenschätzen. Die Echtheit ist allerdings bislang unbewiesen.

China’s APT3 Pilfers Cyberweapons from the NSA - Large portions of APT3's remote code-execution package were likely reverse-engineered from prior a... more: https://threatpost.com/chinas-apt3-pilfers-cyberweapons-nsa/148086/ #networkattackartifacts #vulnerabilities #reverseengineer #eternalromance #cyberarmsrace #equationgroup #shadowbrokers #government #zero-day #apt3 #nsa
China’s APT3 Pilfers Cyberweapons from the NSA

Large portions of APT3's remote code-execution package were likely reverse-engineered from prior attack artifacts.

Threatpost - English - Global - threatpost.com