Facebook with Latestnigeriannews  Twieet with latestnigeriannews  RSS Page Feed
Home  |  All Headlines  |  Punch  |  Thisday  |  Daily Sun  |  Vanguard   |  Guardian  |  The Nation  |  Daily Times  |  Daily Trust  |  Daily Independent
World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  More Channels...

Viewing Mode:

Archive:

  1.     Tool Tips    
  2.    Collapsible   
  3.    Collapsed     
Click to view all Entertainment headlines today

Click to view all Sports headlines today

Experts have 2 theories for how top-secret NSA data was stolen, and they're equally disturbing

Published by Business Insider on Fri, 19 Aug 2016


In the wake of an unprecedented breach of hacking tools and exploits apparently stolen from the US National Security Agency's elite hacking unit, experts are offering two competing theories on how it happenedand they're equally disturbing.Some former agency employees believe that the alleged group behind the leak, the "Shadow Brokers," may have hacked an NSA server that had a top-secret hacker toolkit left there by mistake.Others believe that the Brokers may be just a smokescreen for another possibility: an agency mole."The key thing I think people are missing is that [most are talking] about how someone hacked a command-and-control box somewhere on the internet," Dave Aitel, an ex-NSA research scientist who now leads penetration-testing firm Immunity, told Business Insider. "If you actually look at the files, it really doesn't seem like that is the case."His remarks about looking at the files are interesting, especially in light of a post on Medium by Matt Suiche, the founder of Comae Technologies. He claimed that he was contacted by a former NSA analyst who offered a somewhat-redacted image of an award citation received while working inside the agency for the US Army to prove his bona fides.In the post about this "insider theory," Suiche's source said that the supposed NSA toolkit usually sits on a physically segregated network that never goes near the internet. And even more interesting, the source says, is that when an NSA hackeran operator working in what is called Tailored Access Operations (TAO)is going to carry out a cyberattack on a target, he or she would grab the files from this offline repository and then change many of their file names before they start."The file hierarchy and the unchanged file naming convention tends to say that the files were directly copied from its source," Suiche writes. Aitel, the ex-NSA research scientist, agreed with that assessment as a valid possibility. Further, Aitel argued that putting those types of files up on a computer that an adversary could find is not a common practice."It's not from a [command-and-control] server," he said. "It's just not C2 server stuff. It's operational machine stuff. No one puts their exploits on a C2 server. That's not a thing."'There's all kinds of ugly here'If the leaked files didn't actually get hacked from a server on the internet, then it's possible that the NSA has another "insider threat" probleman especially embarrassing prospect for a spy agency still reeling from the fallout surrounding documents taken by Edward Snowden.The former Booz Allen Hamilton employee who was contracted to work for the NSA leaked an alleged 1.7 million documents to journalists in 2013 before eventually seeking asylum in Moscow, where he remains."There's all kinds of ugly here," John Schindler, a former NSA analyst and counterintelligence officer, told Business Insider, speculating that "there's fear now that this will bring on a serious mole huntwhich, by the way, is completely necessarybut never fun for the workforce. This isn't an entertaining thing to have to worry about, 'Is the guy or girl in the next cubicle a Russian spy''"The previously-unknown Shadow Brokers created a number of social-media accounts earlier this month on Reddit, Github, Twitter, and Imgur, before announcing on August 13 that its "cyber weapon auction," which promised bidders a "full state sponsor tool set" from a hacking unit believed to be within the NSA known only as "The Equation Group."It released a 234-megabyte archive on various file-sharing sites with half being free to view and usewhich numerous experts say is legitimatewhile the other half was encrypted. The winner of the auction, the group said, would get the decryption key.But an auction for hacking tools and exploits is not something that ever happens, experts say. Instead, exploits are bought and sold on the black market for hundreds of thousands and sometimes millions of dollars in private.Also interesting is a newly released linguistic analysis of the group's announcement on Pastebin, a text-sharing site, in which it used broken English."He is a native English speaker who tried to pass himself off as a foreigner," Jeffrey Carr, a cybersecurity expert and CEO of Taia Global, told Business Insider.The cybersecurity firm analyzed the text of the Shadow Brokers auction announcement and found evidence seeming to indicate that the author, or authors, purposely tried to mislead readers in the way they wrote, which included inconsistent errors in the text."The cumulative effect of these multiple lines of evidence leads to the conclusion that the author is most likely a native speaker of US English who is attempting to sound like a non-native speaker by inserting a variety of random grammatical errors," wrote Dr. Shlomo Argamon, an expert on linguistics and the company's chief scientist.So what does this all mean' As ex-NSA employees and computer-security professionals analyze the files leaked by Shadow Brokers, it's becoming increasingly likely that they are legitimate tools, exploits, and implants that were used by NSA hackers.But at this point, the way they ended up getting out of the NSA's grasp is not clear, and that's a big problem."If you don't know how it was lost, there's then a lot of panic in terms of what else is out there, particularly from a counterintelligence perspective," a source who previously worked as a hacker with NSA's Tailored Access Operations unit told Business Insider, on condition of anonymity in order to discuss sensitive matters. "Now you have to really worryare all of my operations exposed' I think that's very concerning to people because they want to be covert and stealth."The NSA did not immediately respond to a request for comment.SEE ALSO:Here's why the supposed NSA 'hack' is unlike anything we've ever seen beforeJoin the conversation about this storyNOW WATCH: FORMER NSA DIRECTOR: America is 'really good' at stealing data from other countries
Click here to read full news..

All Channels Nigerian Dailies: Punch  |  Vanguard   |  The Nation  |  Thisday  |  Daily Sun  |  Guardian  |  Daily Times  |  Daily Trust  |  Daily Independent  |   The Herald  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  New Telegraph  |  Peoples Daily  |  Blueprint  |  Nigerian Pilot  |  Sahara Reporters  |  Premium Times  |  The Cable  |  PM News  |  APO Africa Newsroom

Categories Today: World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Columns  |  All Headlines Today

Entertainment (Local): Linda Ikeji  |  Bella Naija  |  Tori  |  Pulse  |  The NET  |  DailyPost  |  Information Nigeria  |  Gistlover  |  Lailas Blog  |  Miss Petite  |  Olufamous  |  Stella Dimoko Korkus Blog  |  Ynaija  |  All Entertainment News Today

Entertainment (World): TMZ  |  Daily Mail  |  Huffington Post

Sports: Goal  |  African Football  |  Bleacher Report  |  FTBpro  |  Kickoff  |  All Sports Headlines Today

Business & Finance: Nairametrics  |  Nigerian Tenders  |  Business Insider  |  Forbes  |  Entrepreneur  |  The Economist  |  BusinessTech  |  Financial Watch  |  BusinessDay  |  All Business News Headlines Today

Technology (Local): Techpoint  |  TechMoran  |  TechCity  |  Innovation Village  |  IT News Africa  |  Technology Times  |  Technext  |  Techcabal  |  All Technology News Headlines Today

Technology (World): Techcrunch  |  Techmeme  |  Slashdot  |  Wired  |  Hackers News  |  Engadget  |  Pocket Lint  |  The Verge

International Networks:   |  CNN  |  BBC  |  Al Jazeera  |  Yahoo

Forum:   |  Nairaland  |  Naij

Other Links: Home   |  Nigerian Jobs