Intelligence

The leak of NSA hacking tools was caused by a staffer mistake

A US investigation into the leak of the NSA hacking tools used by the Agency is focusing on a theory that it was caused by a staffer mistake.

The hack of the NSA-linked group Equation Group and the leakage of the NSA hacking tools in its arsenal it probably one the most disconcerting events of the year.

Sources close to the investigation revealed that the NSA knew about the data breach for three years but it maintained the secret on the case.

The sources provided further elements on the alleged attack against the US Intelligence Agency, according to the Reuters the NSA itself wasn’t directly hacked by the Shadow Brokers group and the NSA hacking tools and exploits were not stolen by the popular whistleblower Edward Snowden.

According to the sources, it seems that an employee or a contractor mistakenly left the NSA hacking tools unattended on a remote server about three years ago during a cyber operation. The NSA was aware of the incident and did not inform the companies of the risks related to the exposure of the exploits.

The ShadowBrokers hackers then have discovered the server and raided it.

“But officials heading the FBI-led investigation now discount both of those scenarios, the people said in separate interviews. NSA officials have told investigators that an employee or contractor made the mistake about three years ago during an operation that used the tools, the people said.” reported the Reuters.

“That person acknowledged the error shortly afterward, they said. But the NSA did not inform the companies of the danger when it first discovered the exposure of the tools, the sources said. Since the public release of the tools, the companies involved have issued patches in the systems to protect them.”

The staffer, who has since left the US Agency for other reasons, acknowledged the mistake shortly afterward.

Why did the NSA keep the secret?

According to the experts, the NSA was monitoring the Internet searching for evidence of the use of the tools with the intent to discover who was using the dangerous arsenal.

“After the discovery, the NSA tuned its sensors to detect use of any of the tools by other parties, especially foreign adversaries with strong cyber espionage operations, such as China and Russia.” reported the Reuters.

“That could have helped identify rival powers’ hacking targets, potentially leading them to be defended better. It might also have allowed U.S officials to see deeper into rival hacking operations while enabling the NSA itself to continue using the tools for its own operations.

Because the sensors did not detect foreign spies or criminals using the tools on U.S. or allied targets, the NSA did not feel obligated to immediately warn the U.S. manufacturers, an official and one other person familiar with the matter said.”

The circumstance is very serious and could have a serious impact on the security of companies and organizations worldwide.

According to documents obtained by the EFF, the NSA discloses 91% of bugs it finds but doesn’t say when it discloses them.

“The U.S. National Security Agency (NSA) revealed in a press release last month it discloses 91% of vulnerabilities it finds in software made and/or used in the U.S. to developers. But the NSA doesn’t say what it does before it discloses those vulnerabilities, or when it discloses them.” states a post published last year on Mashable.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Equation Group, NSA hacking tools)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Romania’s national oil pipeline firm Conpet reports cyberattack<gwmw style="display:none;"></gwmw>

Romania’s national oil pipeline operator Conpet said a cyberattack disrupted its business systems and temporarily…

1 hour ago

Flickr moves to contain data exposure, warns users of phishing

Flickr says a flaw at a third-party email provider may have exposed users’ names, email…

10 hours ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 83

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

21 hours ago

Security Affairs newsletter Round 562 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

21 hours ago

DKnife toolkit abuses routers to spy and deliver malware since 2019

DKnife is a Linux toolkit used since 2019 to hijack router traffic and deliver malware…

1 day ago

Italian university La Sapienza still offline to mitigate recent cyber attack

Rome’s La Sapienza University was hit by a cyberattack that disrupted IT systems and caused…

2 days ago

This website uses cookies.