On Friday, a hacking group referred to as the "Shadow Brokers" revealed a number of programs that could potentially be used to attack different versions of Windows operating systems.
Did the company buy the access from Shadow Brokers directly or did NSA tip off Microsoft? The NSA spying tools include about 20 exploits which are created to hack into old the versions of Windows. The NSA allegedly claimed in its now hacked and released article that the "box has been implanted and we are collecting", which Wired explains as the "jargon used by the NSA to indicate spyware has been successfully implanted on a computer".
The purported NSA attack tools are said to date from 2013, but Microsoft fixed one of the holes just last month with MS17-010, which is a "Critical" fix for a Server Message Block 1.0 flaw.
Last week, the Shadow Brokers protested Donald Trump's involvement in Syria when they released a password that unlocked a trove of NSA exploits. This would normally mean either that Microsoft somehow found (or purchased) all the vulnerabilities The Shadow Brokers were auctioning off, or perhaps that someone anonymously alerted Microsoft about the bugs.
TheShadowBrokers, which startled the security experts previous year by releasing some of the NSA's hacking tools, has resumed pouring secrets into the public domain, this time by publishing purported details of the NSA's operations against banks across the Arab world. Let us know below.
A collective of security researchers have analyzed the leaked exploits yesterday afternoon, which helped us put a list of all the exploits, here.
"There is no impact on SWIFT's infrastructure or data, however, we understand that communications between these service bureaus and their customers may previously have been accessed by unauthorised third parties". Microsoft didn't elaborate, and only said "Addressed prior to the release of Windows Vista".
Cris Thomas, a prominent security researcher with the cybersecurity firm Tenable, said the documents and files released by the Shadow Brokers show "the NSA has been able to compromise SWIFT banking systems, presumably as a way to monitor, if not disrupt, financial transactions to terrorists groups".
SWIFT told reporters it has not seen unauthorized access on its networks, and EastNets said the same. As it turns out that's not the case, within hours of the Shadow Brokers release Microsoft issued a comprehensive overview of how it has already protected Windows against the newly disclosed Shadow Broker exploits.
Hickey provided The Intercept with a video of FUZZBUNCH being used to compromise a virtual computer running Windows Server 2008-an industry survey from 2016 cited this operating system as the most widely used of its kind.