223:(NSA), was the lead suspect. Martin had worked with the NSA's Tailored Access Operations from 2012 to 2015 in a support role. He pleaded guilty to retaining national defense information in 2019, but it is not clear whether the Shadow Brokers obtained their material from him. The Shadow Brokers continued posting messages that were cryptographically-signed and were interviewed by media while Martin was detained.
259:. As US intelligence agencies were contemplating counter-attacks, the Shadow Brokers code release was to be seen as a warning: "Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in
76:
quoted the following description of that character: "The Shadow Broker is an individual at the head of an expansive organization which trades in information, always selling to the highest bidder. The Shadow Broker appears to be highly competent at its trade: all secrets that are bought and sold never
113:
On
October 31, 2016, The Shadow Brokers published a list of servers supposedly compromised by the Equation Group, as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOICSURGEON) also used by the threat actor.
242:
indicates
Russian responsibility" and that the leak "is likely a warning that someone can prove responsibility for any attacks that originated from this malware server" summarizing that it looks like "somebody sending a message that an escalation in the attribution game could get messy fast".
121:
account used by The Shadow
Brokers posted a new update. The post revealed the password to encrypted files released the previous year, which allegedly had more NSA hacking tools. This posting explicitly stated that the post was partially in response to President Trump's
268:
In 2019, David Aitel, a computer scientist formerly employed by the NSA, summarized the situation with: "I don't know if anybody knows other than the
Russians. And we don't even know if it's the Russians. We don't know at this point; anything could be true."
622:
144:
Some of the exploits targeting the
Windows operating system had been patched in a Microsoft Security Bulletin on March 14, 2017, one month before the leak occurred. Some speculated that Microsoft may have been tipped off about the release of the exploits.
623:"'Shadow Brokers' Reveal List Of Servers Hacked By The NSA; China, Japan, And Korea The Top 3 Targeted Countries; 49 Total Countries, Including: China, Japan, Germany, Korea, India, Italy, Mexico, Spain, Taiwan, & Russia"
403:
77:
allow one customer of the Broker to gain a significant advantage, forcing the customers to continue trading information to avoid becoming disadvantaged, allowing the Broker to remain in business."
141:
The leak was suggested to be the "...most damaging release yet" and CNN quoted
Matthew Hickey saying, "This is quite possibly the most damaging thing I've seen in the last several years".
1237:
134:
On April 14, 2017, The Shadow
Brokers released, amongst other things, the tools and exploits codenamed: DANDERSPRITZ, ODDJOB, FUZZBUNCH, DARKPULSAR, ETERNALSYNERGY, ETERNALROMANCE,
1000:
1583:
1603:
1174:
595:
181:. This allows for the installation of the PEDDLECHEAP payload which would then be accessed by the attacker using the DanderSpritz Listening Post (LP) software.
524:
726:
905:
106:
repository containing references and instructions for obtaining and decrypting the content of a file supposedly containing tools and exploits used by the
471:
290:
443:
1061:
803:
1295:
701:
1269:
879:
580:
2217:
1755:
1229:
510:
1573:
672:
252:
1563:
1517:
853:
974:
2151:
1127:"This leak is likely a warning that someone can prove US responsibility for any attacks that originated from this malware server"
346:
54:
products. The Shadow
Brokers originally attributed the leaks to the Equation Group threat actor, who have been tied to the NSA's
828:
1332:
1687:
94:
started at least in the beginning of August, and that the initial publication occurred August 13, 2016 with a Tweet from a
1149:"TL;DR: This leak looks like a somebody sending a message that an escalation in the attribution game could get messy fast"
2101:
1568:
1080:
778:
2235:
1718:
1496:
1262:
1029:
949:
2241:
1767:
1728:
1363:
159:
Over 200,000 machines were infected with tools from this leak within the first two weeks, and in May 2017, the major
375:
2301:
2247:
1822:
1713:
1542:
562:
30:
who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several
2295:
1099:"Circumstantial evidence and conventional wisdom indicates Russian responsibility. Here's why that is significant"
1649:
1486:
1388:
295:
2698:
1708:
1481:
1450:
1202:
1043:
2748:
1588:
1501:
1300:
1290:
1255:
2462:
1852:
1639:
1578:
1537:
1435:
2199:
1957:
1692:
1455:
542:
123:
1792:
920:
649:
2646:
1987:
1842:
1634:
1527:
1471:
202:
160:
55:
1393:
2127:
2096:
1723:
168:
1682:
424:
2265:
1832:
1750:
1656:
1629:
220:
39:
291:"'President Trump what the f**k are you doing' say Shadow Brokers and dump more NSA hacking tools"
2421:
2085:
1558:
1491:
1337:
66:
Several news sources noted that the group's name was likely in reference to a character from the
42:(NSA) of the United States. Specifically, these exploits and vulnerabilities targeted enterprise
110:. The initial response to the publication was met with some uncertainty about its authenticity.
2738:
1982:
1644:
1624:
2743:
2483:
2436:
2344:
2271:
2055:
1419:
1666:
1522:
2080:
1445:
212:
178:
164:
68:
43:
31:
8:
2570:
1598:
1414:
239:
216:
207:
1927:
1148:
1126:
1098:
2708:
2703:
2600:
2229:
1918:
1608:
1409:
925:
247:
47:
1931:
1440:
496:
2713:
2595:
2565:
2169:
2025:
1383:
1347:
880:"Leaked NSA tools, now infecting over 200,000 machines, will be weaponized for years"
2641:
2493:
2416:
2065:
2002:
1877:
1326:
1233:
1179:
600:
118:
2339:
1175:"Edward Snowden: Russia might have leaked alleged NSA cyberweapons as a 'warning'"
596:"'Shadow Brokers' claim to have hacked an NSA-linked elite computer security unit"
2651:
2626:
2590:
2518:
2431:
2426:
2070:
1862:
1772:
1476:
317:
201:
speculated that an insider, "possibly someone assigned to the highly sensitive
2390:
2385:
2075:
2060:
2050:
2045:
1977:
1952:
1947:
1942:
1887:
1661:
1342:
1206:
256:
231:
107:
90:
While the exact date is unclear, reports suggested that the preparation of the
35:
1532:
727:"Latest Shadow Brokers dump — owning SWIFT Alliance Access, Cisco and Windows"
525:"The 'Shadow Brokers' NSA theft puts the Snowden leaks to shame - ExtremeTech"
2732:
2513:
1972:
1923:
1062:"Hints suggest an insider helped the NSA "Equation Group" hacking tools leak"
752:
547:
380:
261:
194:
91:
444:"NSA-leaking Shadow Brokers lob Molotov cocktail before exiting world stage"
2457:
2411:
2211:
2175:
2030:
2020:
1913:
1908:
1903:
1777:
1593:
448:
175:
99:
27:
2693:
2683:
2631:
2539:
2395:
2205:
2035:
1897:
1762:
950:"zerosum0x0: DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis"
198:
154:
135:
73:
167:(SMB) to spread itself. The exploit was also used to help carry out the
2636:
2621:
2549:
2289:
2193:
2145:
2121:
2109:
1967:
1892:
1882:
1872:
1857:
1817:
1742:
1373:
1247:
566:
702:"NSA-leaking Shadow Brokers just dumped its most damaging release yet"
581:"The Shadow Brokers: Lifting the Shadows of the NSA's Equation Group?"
2667:
2544:
2508:
2498:
2370:
2187:
1937:
1867:
1807:
1368:
1200:
906:"An NSA-derived ransomware worm is shutting down computers worldwide"
543:"Shadow Brokers: Hackers Claim to have Breached NSA's Equation Group"
51:
472:"Confirmed: hacking tool leak came from "omnipotent" NSA-tied group"
265:
where the head of a favorite horse is left in a bed, as a warning."
2575:
2503:
2488:
2307:
2283:
2157:
2139:
2040:
1962:
1797:
1782:
347:"Equation = NSA? Researchers Uncloak Huge 'American Cyber Arsenal'"
322:
184:
2605:
2478:
2441:
2375:
2354:
2324:
2277:
2259:
2181:
2115:
1812:
1802:
1787:
1103:
235:
174:
ETERNALBLUE contains kernel shellcode to load the non-persistent
95:
919:
Perlroth, Nicole; Scott, Mark; Frenkel, Sheera (June 27, 2017).
673:"They're Back: The Shadow Brokers Release More Alleged Exploits"
511:"Group claims to hack NSA-tied hackers, posts exploits as proof"
219:
accused of stealing approximately 50 terabytes of data from the
2688:
2580:
2534:
2349:
2163:
2133:
2012:
1997:
1827:
1378:
1201:
Eric Lipton; David E. Sanger; Scott Shane (December 13, 2016).
428:
103:
1230:"Mystery of NSA leak lingers as stolen document case winds up"
854:"Microsoft says it already patched 'Shadow Brokers' NSA leaks"
2313:
2253:
2223:
1203:"The Perfect Weapon: How Russian Cyberpower Invaded the U.S."
804:"Microsoft says users are protected from alleged NSA malware"
587:
2585:
2380:
1044:"Commentary: Evidence points to another Snowden at the NSA"
1564:
1081:"NSA Exploit Peddlers The Shadow Brokers Call It Quits"
921:"Cyberattack Hits Ukraine Then Spreads Internationally"
425:"Equation Group - Cyber Weapons Auction - Pastebin.com"
318:"'NSA malware' released by Shadow Brokers hacker group"
404:"Powerful NSA hacking tools have been revealed online"
238:
on August 16, 2016 that "circumstantial evidence and
1091:
918:
779:"NSA's powerful Windows hacking tools leaked online"
376:"The NSA Leak is Real, Snowden Documents Confirm"
38:" who are widely suspected to be a branch of the
2730:
647:
185:Speculations and theories on motive and identity
1604:Russian interference in the 2016 U.S. elections
696:
694:
1227:
419:
417:
1263:
1228:Abdollah, Tami; Tucker, Eric (July 6, 2019).
369:
367:
205:", stole the hacking tools. In October 2016,
129:
691:
1574:Democratic National Committee cyber attacks
1001:"DanderSpritz/PeddleCheap Traffic Analysis"
414:
253:Democratic National Committee cyber attacks
226:
1518:Office of Personnel Management data breach
1270:
1256:
829:"Protecting customers and evaluating risk"
563:"Shadow Brokers: NSA Exploits of the Week"
441:
373:
364:
593:
401:
126:, which was also used by Russian forces.
1277:
251:put the incident in the context of the
98:account "@shadowbrokerss" announcing a
85:
2731:
776:
469:
1251:
1172:
975:"Shining Light on The Shadow Brokers"
288:
189:
1030:"Shadow Brokers: The insider theory"
497:"The Equation giveaway - Securelist"
402:Nakashima, Ellen (August 16, 2016).
344:
284:
282:
1569:Commission on Elections data breach
1078:
947:
670:
13:
1240:from the original on July 6, 2019.
648:theshadowbrokers (April 8, 2017).
14:
2760:
1729:Jeff Bezos phone hacking incident
777:Larson, Selena (April 14, 2017).
427:. August 16, 2016. Archived from
279:
61:
2302:Microarchitectural Data Sampling
1538:Ukrainian Power Grid Cyberattack
1446:Cyberterrorism attack of June 25
1079:Cox, Joseph (January 12, 2017).
289:Ghosh, Agamoni (April 9, 2017).
163:used the ETERNALBLUE exploit on
124:attack against a Syrian airfield
1650:2017 Ukraine ransomware attacks
1487:2014 JPMorgan Chase data breach
1221:
1194:
1166:
1141:
1119:
1072:
1054:
1036:
1022:
993:
967:
941:
912:
898:
872:
846:
821:
796:
770:
745:
719:
664:
641:
615:
573:
555:
535:
517:
503:
470:Goodin, Dan (August 16, 2016).
442:Dan Goodin (January 12, 2017).
296:International Business Times UK
138:, EXPLODINGCAN and EWOKFRENZY.
80:
1482:2014 celebrity nude photo leak
1173:Price, Rob (August 16, 2016).
489:
463:
435:
395:
374:Sam Biddle (August 19, 2016).
338:
310:
148:
1:
1719:Bulgarian revenue agency hack
1497:Russian hacker password theft
671:Cox, Joseph (April 8, 2017).
594:Rob Price (August 15, 2016).
272:
1853:Bangladesh Black Hat Hackers
1329:(publication of 2009 events)
948:Sum, Zero (April 21, 2017).
7:
1714:Baltimore ransomware attack
10:
2765:
1988:Tailored Access Operations
1635:WannaCry ransomware attack
1528:Ashley Madison data breach
1472:Anthem medical data breach
1389:PlayStation network outage
215:, a former contractor for
203:Tailored Access Operations
161:WannaCry ransomware attack
152:
130:April 14 hacking tool leak
56:Tailored Access Operations
2676:
2660:
2614:
2558:
2527:
2471:
2450:
2404:
2363:
2332:
2323:
2094:
2011:
1841:
1741:
1724:WhatsApp snooping scandal
1701:
1675:
1617:
1589:Indian Bank data breaches
1551:
1510:
1464:
1428:
1402:
1356:
1319:
1312:
1283:
169:2017 NotPetya cyberattack
2266:Speculative Store Bypass
1833:Ukrainian Cyber Alliance
1630:2017 Macron e-mail leaks
650:"Don't Forget Your Base"
227:Theory on ties to Russia
221:National Security Agency
40:National Security Agency
1640:Westminster data breach
1559:Bangladesh Bank robbery
1502:2014 Yahoo! data breach
1492:2014 Sony Pictures hack
1451:2013 Yahoo! data breach
1436:South Korea cyberattack
1338:Operation Olympic Games
1333:Australian cyberattacks
1983:Syrian Electronic Army
1693:SingHealth data breach
1456:Singapore cyberattacks
1394:RSA SecurID compromise
117:On April 8, 2017, the
2272:Lazy FP state restore
2056:Kristoffer von Hassel
1709:Sri Lanka cyberattack
1579:Vietnam Airport Hacks
1420:Operation High Roller
979:The State of Security
2749:Hacking in the 2010s
2218:Silent Bob is Silent
1278:Hacking in the 2010s
213:Harold T. Martin III
165:Server Message Block
86:Equation Group leaks
2152:SS7 vulnerabilities
1688:Atlanta cyberattack
1657:Equifax data breach
1415:Stratfor email leak
1364:Canadian government
1343:Operation ShadowNet
431:on August 15, 2016.
408:The Washington Post
255:and hacking of the
240:conventional wisdom
217:Booz Allen Hamilton
208:The Washington Post
72:video game series.
2601:Petya and NotPetya
2230:ROCA vulnerability
1993:The Shadow Brokers
1919:Iranian Cyber Army
1845:persistent threats
1645:Petya and NotPetya
1609:2016 Bitfinex hack
1584:DCCC cyber attacks
1543:SWIFT banking hack
1068:. August 22, 2016.
1050:. August 23, 2016.
1032:. August 17, 2016.
1010:. February 6, 2018
926:The New York Times
679:. Vice Motherboard
629:. November 1, 2016
583:. August 15, 2016.
569:. August 15, 2016.
551:. August 15, 2016.
531:. August 19, 2016.
513:. August 16, 2016.
499:. August 16, 2016.
345:Brewster, Thomas.
248:The New York Times
190:NSA insider threat
171:on June 27, 2017.
48:antivirus software
20:The Shadow Brokers
2726:
2725:
2722:
2721:
2714:ZeroAccess botnet
2026:Mustafa Al-Bassam
1793:New World Hackers
1756:associated events
1737:
1736:
1533:VTech data breach
1384:Operation AntiSec
1348:Operation Payback
1307:
1306:
1129:. August 16, 2016
1107:. August 16, 2016
32:zero-day exploits
2756:
2330:
2329:
2003:Yemen Cyber Army
1327:Operation Aurora
1317:
1316:
1286:
1285:
1272:
1265:
1258:
1249:
1248:
1242:
1241:
1234:Associated Press
1225:
1219:
1218:
1216:
1214:
1198:
1192:
1191:
1189:
1187:
1180:Business Insider
1170:
1164:
1163:
1161:
1159:
1145:
1139:
1138:
1136:
1134:
1123:
1117:
1116:
1114:
1112:
1095:
1089:
1088:
1076:
1070:
1069:
1058:
1052:
1051:
1040:
1034:
1033:
1026:
1020:
1019:
1017:
1015:
1005:
997:
991:
990:
988:
986:
971:
965:
964:
962:
960:
945:
939:
938:
936:
934:
916:
910:
909:
902:
896:
895:
893:
891:
886:. April 24, 2017
876:
870:
869:
867:
865:
860:. April 15, 2017
850:
844:
843:
841:
839:
825:
819:
818:
816:
814:
800:
794:
793:
791:
789:
774:
768:
767:
765:
763:
749:
743:
742:
740:
738:
733:. April 14, 2017
723:
717:
716:
714:
712:
698:
689:
688:
686:
684:
668:
662:
661:
659:
657:
645:
639:
638:
636:
634:
627:Fortuna's Corner
619:
613:
612:
610:
608:
601:Business Insider
591:
585:
584:
577:
571:
570:
559:
553:
552:
539:
533:
532:
521:
515:
514:
507:
501:
500:
493:
487:
486:
484:
482:
467:
461:
460:
458:
456:
439:
433:
432:
421:
412:
411:
399:
393:
392:
390:
388:
371:
362:
361:
359:
357:
342:
336:
335:
333:
331:
326:. April 10, 2017
314:
308:
307:
305:
303:
286:
2764:
2763:
2759:
2758:
2757:
2755:
2754:
2753:
2729:
2728:
2727:
2718:
2672:
2656:
2610:
2554:
2523:
2467:
2446:
2400:
2359:
2319:
2099:
2097:vulnerabilities
2090:
2007:
1900:(confederation)
1863:Charming Kitten
1844:
1837:
1773:Goatse Security
1733:
1697:
1671:
1662:Deloitte breach
1613:
1599:Dyn cyberattack
1547:
1506:
1477:Operation Tovar
1460:
1424:
1398:
1352:
1313:Major incidents
1308:
1279:
1276:
1246:
1245:
1226:
1222:
1212:
1210:
1199:
1195:
1185:
1183:
1171:
1167:
1157:
1155:
1147:
1146:
1142:
1132:
1130:
1125:
1124:
1120:
1110:
1108:
1097:
1096:
1092:
1077:
1073:
1060:
1059:
1055:
1042:
1041:
1037:
1028:
1027:
1023:
1013:
1011:
1003:
999:
998:
994:
984:
982:
973:
972:
968:
958:
956:
946:
942:
932:
930:
917:
913:
908:. May 12, 2017.
904:
903:
899:
889:
887:
878:
877:
873:
863:
861:
852:
851:
847:
837:
835:
827:
826:
822:
812:
810:
802:
801:
797:
787:
785:
775:
771:
761:
759:
751:
750:
746:
736:
734:
725:
724:
720:
710:
708:
700:
699:
692:
682:
680:
669:
665:
655:
653:
646:
642:
632:
630:
621:
620:
616:
606:
604:
592:
588:
579:
578:
574:
561:
560:
556:
541:
540:
536:
523:
522:
518:
509:
508:
504:
495:
494:
490:
480:
478:
468:
464:
454:
452:
440:
436:
423:
422:
415:
400:
396:
386:
384:
372:
365:
355:
353:
343:
339:
329:
327:
316:
315:
311:
301:
299:
287:
280:
275:
229:
192:
187:
157:
151:
132:
88:
83:
64:
17:
12:
11:
5:
2762:
2752:
2751:
2746:
2741:
2724:
2723:
2720:
2719:
2717:
2716:
2711:
2706:
2701:
2696:
2691:
2686:
2680:
2678:
2674:
2673:
2671:
2670:
2664:
2662:
2658:
2657:
2655:
2654:
2649:
2644:
2639:
2634:
2629:
2624:
2618:
2616:
2612:
2611:
2609:
2608:
2603:
2598:
2593:
2588:
2583:
2578:
2573:
2568:
2562:
2560:
2556:
2555:
2553:
2552:
2547:
2542:
2537:
2531:
2529:
2525:
2524:
2522:
2521:
2516:
2511:
2506:
2501:
2496:
2491:
2486:
2484:Black Energy 3
2481:
2475:
2473:
2469:
2468:
2466:
2465:
2460:
2454:
2452:
2448:
2447:
2445:
2444:
2439:
2434:
2429:
2424:
2419:
2414:
2408:
2406:
2402:
2401:
2399:
2398:
2393:
2391:Metulji botnet
2388:
2383:
2378:
2373:
2367:
2365:
2361:
2360:
2358:
2357:
2352:
2347:
2345:Black Energy 2
2342:
2336:
2334:
2327:
2321:
2320:
2318:
2317:
2311:
2305:
2299:
2293:
2287:
2281:
2275:
2269:
2263:
2257:
2251:
2245:
2239:
2233:
2227:
2221:
2215:
2209:
2203:
2200:Broadcom Wi-Fi
2197:
2191:
2185:
2179:
2173:
2167:
2161:
2155:
2149:
2143:
2137:
2131:
2125:
2119:
2113:
2106:
2104:
2092:
2091:
2089:
2088:
2083:
2078:
2073:
2068:
2063:
2061:Junaid Hussain
2058:
2053:
2051:Jeremy Hammond
2048:
2046:Elliott Gunton
2043:
2038:
2033:
2028:
2023:
2017:
2015:
2009:
2008:
2006:
2005:
2000:
1995:
1990:
1985:
1980:
1978:Stealth Falcon
1975:
1970:
1965:
1960:
1955:
1953:PLA Unit 61486
1950:
1948:PLA Unit 61398
1945:
1943:Numbered Panda
1940:
1935:
1921:
1916:
1911:
1906:
1901:
1895:
1890:
1888:Equation Group
1885:
1880:
1875:
1870:
1865:
1860:
1855:
1849:
1847:
1839:
1838:
1836:
1835:
1830:
1825:
1820:
1815:
1810:
1805:
1800:
1795:
1790:
1785:
1780:
1775:
1770:
1765:
1760:
1759:
1758:
1747:
1745:
1739:
1738:
1735:
1734:
1732:
1731:
1726:
1721:
1716:
1711:
1705:
1703:
1699:
1698:
1696:
1695:
1690:
1685:
1679:
1677:
1673:
1672:
1670:
1669:
1664:
1659:
1654:
1653:
1652:
1642:
1637:
1632:
1627:
1621:
1619:
1615:
1614:
1612:
1611:
1606:
1601:
1596:
1591:
1586:
1581:
1576:
1571:
1566:
1561:
1555:
1553:
1549:
1548:
1546:
1545:
1540:
1535:
1530:
1525:
1520:
1514:
1512:
1508:
1507:
1505:
1504:
1499:
1494:
1489:
1484:
1479:
1474:
1468:
1466:
1462:
1461:
1459:
1458:
1453:
1448:
1443:
1438:
1432:
1430:
1426:
1425:
1423:
1422:
1417:
1412:
1406:
1404:
1400:
1399:
1397:
1396:
1391:
1386:
1381:
1379:HBGary Federal
1376:
1371:
1366:
1360:
1358:
1354:
1353:
1351:
1350:
1345:
1340:
1335:
1330:
1323:
1321:
1314:
1310:
1309:
1305:
1304:
1298:
1293:
1284:
1281:
1280:
1275:
1274:
1267:
1260:
1252:
1244:
1243:
1220:
1207:New York Times
1193:
1165:
1140:
1118:
1090:
1071:
1053:
1035:
1021:
992:
981:. May 18, 2017
966:
940:
911:
897:
871:
845:
820:
795:
769:
744:
718:
690:
663:
640:
614:
586:
572:
554:
534:
516:
502:
488:
462:
434:
413:
394:
363:
337:
309:
277:
276:
274:
271:
257:Podesta emails
232:Edward Snowden
228:
225:
211:reported that
191:
188:
186:
183:
153:Main article:
150:
147:
131:
128:
108:Equation Group
87:
84:
82:
79:
63:
62:Name and alias
60:
36:Equation Group
15:
9:
6:
4:
3:
2:
2761:
2750:
2747:
2745:
2742:
2740:
2739:Hacker groups
2737:
2736:
2734:
2715:
2712:
2710:
2707:
2705:
2702:
2700:
2697:
2695:
2692:
2690:
2687:
2685:
2682:
2681:
2679:
2675:
2669:
2666:
2665:
2663:
2659:
2653:
2650:
2648:
2645:
2643:
2640:
2638:
2635:
2633:
2630:
2628:
2625:
2623:
2620:
2619:
2617:
2613:
2607:
2604:
2602:
2599:
2597:
2594:
2592:
2589:
2587:
2584:
2582:
2579:
2577:
2574:
2572:
2569:
2567:
2564:
2563:
2561:
2557:
2551:
2548:
2546:
2543:
2541:
2538:
2536:
2533:
2532:
2530:
2526:
2520:
2517:
2515:
2514:Gameover ZeuS
2512:
2510:
2507:
2505:
2502:
2500:
2497:
2495:
2492:
2490:
2487:
2485:
2482:
2480:
2477:
2476:
2474:
2470:
2464:
2461:
2459:
2456:
2455:
2453:
2449:
2443:
2440:
2438:
2435:
2433:
2430:
2428:
2425:
2423:
2420:
2418:
2415:
2413:
2410:
2409:
2407:
2403:
2397:
2394:
2392:
2389:
2387:
2384:
2382:
2379:
2377:
2374:
2372:
2369:
2368:
2366:
2362:
2356:
2353:
2351:
2348:
2346:
2343:
2341:
2338:
2337:
2335:
2331:
2328:
2326:
2322:
2315:
2312:
2309:
2306:
2303:
2300:
2297:
2294:
2291:
2288:
2285:
2282:
2279:
2276:
2273:
2270:
2267:
2264:
2261:
2258:
2255:
2252:
2249:
2246:
2243:
2240:
2237:
2234:
2231:
2228:
2225:
2222:
2219:
2216:
2213:
2210:
2207:
2204:
2201:
2198:
2195:
2192:
2189:
2186:
2183:
2180:
2177:
2174:
2171:
2168:
2165:
2162:
2159:
2156:
2153:
2150:
2147:
2144:
2141:
2138:
2135:
2132:
2129:
2126:
2123:
2120:
2117:
2114:
2111:
2108:
2107:
2105:
2103:
2098:
2093:
2087:
2084:
2082:
2079:
2077:
2074:
2072:
2069:
2067:
2064:
2062:
2059:
2057:
2054:
2052:
2049:
2047:
2044:
2042:
2039:
2037:
2034:
2032:
2029:
2027:
2024:
2022:
2019:
2018:
2016:
2014:
2010:
2004:
2001:
1999:
1996:
1994:
1991:
1989:
1986:
1984:
1981:
1979:
1976:
1974:
1973:Rocket Kitten
1971:
1969:
1966:
1964:
1961:
1959:
1956:
1954:
1951:
1949:
1946:
1944:
1941:
1939:
1936:
1933:
1929:
1925:
1924:Lazarus Group
1922:
1920:
1917:
1915:
1912:
1910:
1907:
1905:
1902:
1899:
1896:
1894:
1891:
1889:
1886:
1884:
1881:
1879:
1876:
1874:
1871:
1869:
1866:
1864:
1861:
1859:
1856:
1854:
1851:
1850:
1848:
1846:
1840:
1834:
1831:
1829:
1826:
1824:
1821:
1819:
1816:
1814:
1811:
1809:
1806:
1804:
1801:
1799:
1796:
1794:
1791:
1789:
1786:
1784:
1781:
1779:
1776:
1774:
1771:
1769:
1766:
1764:
1761:
1757:
1754:
1753:
1752:
1749:
1748:
1746:
1744:
1740:
1730:
1727:
1725:
1722:
1720:
1717:
1715:
1712:
1710:
1707:
1706:
1704:
1700:
1694:
1691:
1689:
1686:
1684:
1681:
1680:
1678:
1674:
1668:
1667:Disqus breach
1665:
1663:
1660:
1658:
1655:
1651:
1648:
1647:
1646:
1643:
1641:
1638:
1636:
1633:
1631:
1628:
1626:
1623:
1622:
1620:
1616:
1610:
1607:
1605:
1602:
1600:
1597:
1595:
1592:
1590:
1587:
1585:
1582:
1580:
1577:
1575:
1572:
1570:
1567:
1565:
1562:
1560:
1557:
1556:
1554:
1550:
1544:
1541:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1521:
1519:
1516:
1515:
1513:
1509:
1503:
1500:
1498:
1495:
1493:
1490:
1488:
1485:
1483:
1480:
1478:
1475:
1473:
1470:
1469:
1467:
1463:
1457:
1454:
1452:
1449:
1447:
1444:
1442:
1441:Snapchat hack
1439:
1437:
1434:
1433:
1431:
1427:
1421:
1418:
1416:
1413:
1411:
1410:LinkedIn hack
1408:
1407:
1405:
1401:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1361:
1359:
1355:
1349:
1346:
1344:
1341:
1339:
1336:
1334:
1331:
1328:
1325:
1324:
1322:
1318:
1315:
1311:
1303: →
1302:
1299:
1297:
1294:
1292:
1289:←
1288:
1287:
1282:
1273:
1268:
1266:
1261:
1259:
1254:
1253:
1250:
1239:
1235:
1231:
1224:
1209:
1208:
1204:
1197:
1182:
1181:
1176:
1169:
1154:
1150:
1144:
1128:
1122:
1106:
1105:
1100:
1094:
1086:
1082:
1075:
1067:
1063:
1057:
1049:
1045:
1039:
1031:
1025:
1009:
1002:
996:
980:
976:
970:
955:
951:
944:
928:
927:
922:
915:
907:
901:
885:
881:
875:
859:
855:
849:
834:
830:
824:
809:
805:
799:
784:
780:
773:
758:
754:
748:
732:
728:
722:
707:
703:
697:
695:
678:
674:
667:
651:
644:
628:
624:
618:
603:
602:
597:
590:
582:
576:
568:
564:
558:
550:
549:
548:The Daily Dot
544:
538:
530:
526:
520:
512:
506:
498:
492:
477:
473:
466:
451:
450:
445:
438:
430:
426:
420:
418:
409:
405:
398:
383:
382:
381:The Intercept
377:
370:
368:
352:
348:
341:
325:
324:
319:
313:
298:
297:
292:
285:
283:
278:
270:
266:
264:
263:
262:The Godfather
258:
254:
250:
249:
244:
241:
237:
233:
224:
222:
218:
214:
210:
209:
204:
200:
196:
195:James Bamford
182:
180:
177:
172:
170:
166:
162:
156:
146:
142:
139:
137:
127:
125:
120:
115:
111:
109:
105:
101:
97:
93:
78:
75:
71:
70:
59:
57:
53:
49:
45:
41:
37:
33:
29:
25:
21:
2744:Cyberwarfare
2458:CryptoLocker
2212:DoublePulsar
2031:Cyber Anakin
2021:Ryan Ackroyd
1992:
1914:Helix Kitten
1909:Hacking Team
1904:Guccifer 2.0
1778:Lizard Squad
1594:Surkov leaks
1523:Hacking Team
1223:
1211:. Retrieved
1205:
1196:
1184:. Retrieved
1178:
1168:
1156:. Retrieved
1152:
1143:
1131:. Retrieved
1121:
1109:. Retrieved
1102:
1093:
1084:
1074:
1066:Ars Technica
1065:
1056:
1047:
1038:
1024:
1012:. Retrieved
1007:
995:
985:November 15,
983:. Retrieved
978:
969:
959:November 15,
957:. Retrieved
953:
943:
931:. Retrieved
924:
914:
900:
888:. Retrieved
883:
874:
862:. Retrieved
857:
848:
836:. Retrieved
832:
823:
811:. Retrieved
807:
798:
786:. Retrieved
782:
772:
760:. Retrieved
756:
753:"misterch0c"
747:
735:. Retrieved
730:
721:
709:. Retrieved
706:Ars Technica
705:
681:. Retrieved
676:
666:
654:. Retrieved
643:
631:. Retrieved
626:
617:
605:. Retrieved
599:
589:
575:
557:
546:
537:
528:
519:
505:
491:
479:. Retrieved
476:Ars Technica
475:
465:
453:. Retrieved
449:Ars Technica
447:
437:
429:the original
407:
397:
385:. Retrieved
379:
356:November 25,
354:. Retrieved
350:
340:
328:. Retrieved
321:
312:
300:. Retrieved
294:
267:
260:
246:
245:
230:
206:
193:
176:DoublePulsar
173:
158:
143:
140:
133:
116:
112:
89:
81:Leak history
67:
65:
34:, from the "
28:hacker group
23:
19:
18:
16:Hacker group
2694:NetTraveler
2632:LogicLocker
2540:Hidden Tear
2437:Red October
2296:Dragonblood
2206:EternalBlue
2170:Stagefright
2036:George Hotz
2013:Individuals
1763:CyberBerkut
1153:twitter.com
1085:Motherboard
1014:February 7,
929:. p. 1
677:Motherboard
633:January 14,
529:Extremetech
481:January 14,
455:January 14,
199:Matt Suiche
197:along with
155:EternalBlue
149:EternalBlue
136:ETERNALBLUE
102:page and a
74:Matt Suiche
69:Mass Effect
2733:Categories
2637:Rensenware
2622:BrickerBot
2550:TeslaCrypt
2340:Bad Rabbit
2290:Foreshadow
2194:Cloudbleed
2146:Row hammer
2128:Shellshock
2122:Heartbleed
2110:Evercookie
2086:The Jester
1968:Red Apollo
1928:BlueNorOff
1898:GOSSIPGIRL
1893:Fancy Bear
1883:Elfin Team
1878:DarkMatter
1873:Dark Basin
1858:Bureau 121
1818:Teamp0ison
1743:Hacktivism
1374:DNSChanger
1186:August 22,
1158:August 22,
1133:August 22,
1111:August 22,
1008:Forcepoint
954:zerosum0x0
884:CyberScoop
567:Medium.com
273:References
234:stated on
2668:VPNFilter
2545:Rombertik
2509:FinFisher
2499:DarkHotel
2463:DarkSeoul
2371:Coreflood
2236:BlueBorne
2188:Dirty COW
2102:disclosed
2100:publicly
1938:NSO Group
1868:Cozy Bear
1808:PayPal 14
1751:Anonymous
1625:SHAttered
1369:DigiNotar
1213:April 15,
890:April 24,
864:April 15,
838:April 15,
813:April 15,
788:April 15,
762:April 15,
737:April 15,
711:April 15,
607:April 15,
387:April 15,
330:April 10,
302:April 10,
52:Microsoft
44:firewalls
2709:Titanium
2652:XafeCopy
2647:WannaCry
2576:KeRanger
2504:Duqu 2.0
2489:Carbanak
2308:BlueKeep
2284:SigSpoof
2242:Meltdown
2158:WinShock
2140:Rootpipe
2041:Guccifer
1963:Pranknet
1958:PLATINUM
1932:AndAriel
1843:Advanced
1798:NullCrew
1783:LulzRaft
1683:Trustico
1296:Timeline
1238:Archived
933:June 27,
858:Engadget
783:CNNMoney
683:April 8,
656:April 9,
652:. Medium
323:BBC News
179:backdoor
100:Pastebin
2606:X-Agent
2596:Pegasus
2479:Brambul
2442:Shamoon
2386:Kelihos
2376:Alureon
2355:Stuxnet
2325:Malware
2278:TLBleed
2260:Exactis
2248:Spectre
2182:Badlock
2116:iSeeYou
2081:Topiary
1813:RedHack
1803:OurMine
1788:LulzSec
1104:Twitter
1048:Reuters
808:AP News
236:Twitter
96:Twitter
26:) is a
2689:Joanap
2642:Triton
2581:Necurs
2571:Jigsaw
2566:Hitler
2535:Dridex
2494:Careto
2417:Dexter
2350:SpyEye
2316:(2019)
2310:(2019)
2304:(2019)
2298:(2019)
2292:(2018)
2286:(2018)
2280:(2018)
2274:(2018)
2268:(2018)
2262:(2018)
2256:(2018)
2250:(2018)
2244:(2018)
2238:(2017)
2232:(2017)
2226:(2017)
2220:(2017)
2214:(2017)
2208:(2017)
2202:(2017)
2196:(2017)
2190:(2016)
2184:(2016)
2178:(2016)
2172:(2015)
2166:(2015)
2164:JASBUG
2160:(2014)
2154:(2014)
2148:(2014)
2142:(2014)
2136:(2014)
2134:POODLE
2130:(2014)
2124:(2014)
2118:(2013)
2112:(2010)
2095:Major
2076:Track2
1998:xDedic
1828:UGNazi
757:GitHub
731:Medium
351:Forbes
119:Medium
104:GitHub
58:unit.
50:, and
2704:Tinba
2591:Mirai
2519:Regin
2432:Mahdi
2427:Flame
2412:Carna
2396:Stars
2314:Kr00k
2254:EFAIL
2224:KRACK
2176:DROWN
1301:2020s
1291:2000s
1004:(PDF)
2699:R2D2
2684:Grum
2677:2019
2661:2018
2627:Kirk
2615:2017
2586:MEMZ
2559:2016
2528:2015
2472:2014
2451:2013
2405:2012
2381:Duqu
2364:2011
2333:2010
2071:Sabu
1823:TDO
1768:GNAA
1702:2019
1676:2018
1618:2017
1552:2016
1511:2015
1465:2014
1429:2013
1403:2012
1357:2011
1320:2010
1215:2017
1188:2016
1160:2016
1135:2016
1113:2016
1016:2018
987:2017
961:2017
935:2017
892:2017
866:2017
840:2017
833:MSRC
815:2017
790:2017
764:2017
739:2017
713:2017
685:2017
658:2017
635:2017
609:2017
483:2017
457:2017
389:2017
358:2020
332:2017
304:2017
92:leak
2422:FBI
2066:MLT
1930:) (
24:TSB
2735::
1236:.
1232:.
1177:.
1151:.
1101:.
1083:.
1064:.
1046:.
1006:.
977:.
952:.
923:.
882:.
856:.
831:.
806:.
781:.
755:.
729:.
704:.
693:^
675:.
625:.
598:.
565:.
545:.
527:.
474:.
446:.
416:^
406:.
378:.
366:^
349:.
320:.
293:.
281:^
46:,
1934:)
1926:(
1271:e
1264:t
1257:v
1217:.
1190:.
1162:.
1137:.
1115:.
1087:.
1018:.
989:.
963:.
937:.
894:.
868:.
842:.
817:.
792:.
766:.
741:.
715:.
687:.
660:.
637:.
611:.
485:.
459:.
410:.
391:.
360:.
334:.
306:.
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.