By: Jillian Stella, September 18, 2017 (20:15 PM)

The Return of Shadow Brokers

We’re nearing 2018 and subscriptions are huge. If anything, they’re bigger than ever. You can subscribe to just about anything your heart desires; whether it is People Magazine, FitFunFab, Spotify, Netflix, Birchbox, etc.

As of this June, you can add UNITEDRAKE to the subscription list – a bi-monthly issue to the National Security Agency exploits. And as no surprise, payments for the leaks are accepted through cryptocurrency (strictly ZCash because Monero uses too many channels and is too risky).

Thanks to the ShadowBrokers, every two to four weeks, NSA exploits that are used to target Windows machines are publicized to its loyal subscribers.

Targeted machines include:

  • Windows XP
  • Windows Server 2003
  • Windows Server 2008
  • Windows Vista
  • Windows 7 SP 1
  • Windows 8
  • Windows Server 2012

Yep – they’re back and they ain’t going nowhere.

Such malware allows the attacker to technically hang out in another Window’s system environment. “Hanging out” includes monitoring the victim’s desktop and webcam, tuning into their mic, and stealing valuable passwords through keystrokes.

Unlike the hacktivist group, Anonymous, the ShadowBrokers are not looking to recruit or raise awareness, they’re only looking to make profit off their hard-earned achievements.

And boy do they have a good marketing strategy.

The hacking group has been cleverly teasing the public with short leaks of the stolen NSA exploits, leaving devotees on the edge of their seats. Only to come back and say, “we will continue to give you what you want, but we want your money in return.”

The ShadowBrokers are building a cult, not a community. And they’re really living up to their name.

Jillian Stella

Jillian Stella is a recent graduate from the University at Albany where she obtained a Bachelor’s of Science degree in Digital Forensics. Jillian is a Security Analyst and Researcher at Cursive Security where she works with and performs assessment and response services for clients. She is currently conducting research in the area of cyber threat intelligence.

Be Informed. Stay One Step Ahead.

Sign up for our newsletter and stay up to date with the latest industry news, trends, and technologies