Home / Tech News / The Shadow Brokers are back with exploits for Windows and global banking systems

The Shadow Brokers are back with exploits for Windows and global banking systems

It’s been several months since their last major exploit, but the hacking group dubbed Shadow Brokers is back. The group, which last year dumped malware it had allegedly stolen from The Equation Group, a hacking team associated with the NSA, posted new files over the weekend and followed up today with a dump of Windows exploits.

The latest files contain tools apparently designed to access Windows machines, as well as slideshows documenting the targeting of banking systems.

“Is being too bad nobody deciding to be paying theshadowbrokers for just to shutup and going away. TheShadowBrokers rather being getting drunk with McAfee on desert island with hot babes,” the group wrote in a post announcing the file release.

Security researchers analyzing the files say that The Equation Group targeted VPNs and firewalls to gain access to banking systems. The newly-published exploits appear to primarily target older versions of Windows, but some appear to be as current as Windows 8.

Researchers are still combing through the files to see what’s fresh and what isn’t. So far, some of the most significant exploits appear to center around SWIFT Alliance Access (SAA), a flagship financial messaging interface used by banks around the world. The files suggest that the NSA is actively targeting international banking bureaus, specifically through a widespread global protocol for secure financial messaging and transactions. According to the files, two NSA programs known as JEEPFLEA_POWDER and JEEPFLEA_MARKET exist to specifically compromise SWIFT bureaus and services.

TechCrunch has contacted Microsoft and SWIFT for comment and will update if we hear back.

Source link

About admin

Check Also

Coinbase hits top spot on Apple’s US App Store despite struggling to handle bitcoin demand

Ignoring recent price rises for a second, if you can — there’s no greater sign ...

Leave a Reply

Your email address will not be published. Required fields are marked *