Throwback: NSA Hacking Tools - What You Need To Know

Last updated: July 5, 2023 Reading time: 5 minutes
Disclosure
Share
NSA agency

Announcing the auction of NSA agency made “cyber weapons” by a hacking group, “Shadow Brokers” confirms the cache of documents released by the whistleblower Edward Snowden. It affirms indeed that this NSA authentic software is used secretly to infect computers worldwide. Over the debate on how this software leaked, one thing is beyond certainty this malware originates from the NSA agency.

16 Character string tying Shadow Broker leak and malware

The evidence of the Shadow Broker data dumps connecting to the classified NSA internal agency manual is provided by Edward Snowden, never-before-published to the public. The draft manual guides NSA operators to track their use of malware programs by a 16-character string, “ace02468bdf13579.” The Shadow Broker leak shows this string throughout the data associating the code with a program SECONDDATE.

What others had to say and the NSA’s silence

Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley, said in an interview with . “.”