(credit: Shadow Brokers ) In what security experts say is either a one-of-a-kind breach or an elaborate hoax, an anonymous group has published what it claims are sophisticated software tools belonging to an elite team of hackers tied to the US National Security Agency. In a recently published blog post, the group calling itself Shadow Brokers claims the leaked set of exploits were obtained after members hacked Equation Group (the post has since been removed from Tumblr). Last year, Kaspersky Lab researchers described Equation Group as one of the world’s most advanced hacking groups , with ties to both the Stuxnet and Flame espionage malware platforms. The compressed data accompanying the Shadow Broker post is slightly bigger than 256 megabytes and purports to contain a series of hacking tools dating back to 2010. While it wasn’t immediately possible for outsiders to prove the posted data—mostly batch scripts and poorly coded python scripts—belonged to Equation Group, there was little doubt the data have origins with some advanced hacking group. Not fully fake “These files are not fully fake for sure,” Bencsáth Boldizsár, a researcher with Hungary-based CrySyS who is widely credited with discovering Flame, told Ars in an e-mail. “Most likely they are part of the NSA toolset, judging just by the volume and peeps into the samples. At first glance it is sound that these are important attack related files, and yes, the first guess would be Equation Group.” Read 6 remaining paragraphs | Comments
Read More:
Group claims to hack NSA-tied hackers, posts exploits as proof
BitTorrent has released a new version of its Sync peer-to-peer app, and its biggest feature is the encrypted folder. Any data you keep in one will be encrypted, whether you choose to place it on cloud storage or on a networked storage device (NAS). Plus, your files are always encrypted while they’re being transferred. When you create one of these folders , you get three types of keys. The Read-Write key allows peers to access and modify its contents, the Read-Only key gives peers the power to access and decrypt the files, while the Encrypted key only allows peers to receive the files — they won’t be able to decrypt them. For instance, you can provide your clients with a Read-Write key to allow them to modify the documents you’re working on. But, you can give vendors Read Only keys to show them what you have to offer. If you want to make a backup, say on a cloud service, you can make a folder that uses only an Encrypted key to be extra safe. Besides the security feature, the latest version of Sync also gives it the ability to run as a service on Windows, as well as to move data to and from an SD card used by Android 5 devices and newer. Finally, if you’re on Linux, the update will allow you to only download files you’re missing instead of replicating whole folders. Source: BitTorrent Sync (1) , (2)