NSA
November 7, 2016 by

Hacker Group Shadow Brokers Releases List of Servers Hacked by the NSA

Shadow Brokers, the hacker group that previously took responsibility for leaking a number of the hacking tools and exploits used by the NSA, has now released details of the foreign servers targeted and compromised by the U.S. intelligence agency.

In a new file dump, the hacktivist group known as Shadow Brokers has published a list of foreign servers allegedly compromised by Equation Group, the NSA-linked hacking outfit.

As reported by the Hacker News, the data dump reveals some 306 domain names and 352 IP addresses from at least 49 domains. 32 domains were run by Chinese and Taiwanese educational institutions.

At least nine domains included .gov Russian websites, among several other domains targeted in Russia.

Altogether, the top 10 targeted countries are China, Japan, Korea, Spain, Germany, India, Taiwan, Mexico, Italy and Russia.

Signed by the same key used in the previous dump revealed by Shadow Brokers, the hacking group has put up the dump on Mega, Kim Dotcom’s revamped file-sharing website, along with a password on its official blog.

The blog post revealed the political undertones related to the newly-released data dump, with a representative of Shadow Brokers adding:

USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer.

TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? 

Mustafa Al-Bassam, a former member of the Anonymous hacking collective and the infamous Lulzsec hacker group commented on the dumps, noting in a series of tweets:

“So even the NSA hacks machines from compromised servers in China and Russia. This is why attribution is hard.”

“So the NSA hacked a British ISP (Colt) to use them as a guinea pig for covering their tracks.”

Image credit: Wikimedia.

About the author

Image of Author

LIFARS is the global leader in Digital Forensics and Cyber Resiliency Services. Our experience spans two decades working on high profile events, often in concert with Law Enforcement Agencies around the world. Our proprietary methodology derives directly and indirectly from our experience working with and for U.S. Intelligence Agencies, Interpol, Europol, and NATO. We are solely dedicated to Cyber Resiliency and thus pay close attention to all aspects of our clients’ engagements experience while providing a strategic and integrated array of services to minimum risk and disruption while protecting your brand.

Related articles

Kaspersky Denies Involvement in Russia’s Hack of NSA Contractor

Moscow-based cybersecurity firm Kaspersky Labs has denied a Wall Street Journal report that alleges...

Read more arrow_forward

NSA White-Hat Hackers are Reportedly Quitting in Droves

The NSA is seeing an increased number of employed hackers and cyberespionage agents quitting the...

Read more arrow_forward

Former NSA Contractor Indicted Over Theft of Govt Hacking Tools

A former contractor has been indicted for the alleged theft of government property that includes...

Read more arrow_forward