• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Government

Snowden points finger at Russia over NSA hack

Tweets offer possible cause for major hack

Edward Snowden NSA Prism whistleblower
Snowden thinks Russia is behind NSA hack
  • Graeme Burton
  • @graemeburton
  • 16 August 2016
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

The auction of hacking tools reportedly stolen from a server belonging to Equation Group, a hacking outfit linked with the US National Security Agency (NSA), is a coded message to the US authorities, according to NSA whistleblower Edward Snowden.

He believes that the attack was genuine and that the group does have tools used by the NSA up until June 2013 when Snowden went public. However, Snowden suggested that the auction is not intended as a shakedown of the rich and gullible, but to send a message to the NSA to back off.

Snowden described in a series of tweets how online hacking by intelligence services works. "The hack of an NSA malware staging server is not unprecedented, but the publication of the take is," he tweeted.

"NSA traces and targets malware C2 servers in a practice called Counter Computer Network Exploitation, or CCNE. So do our rivals. NSA is often lurking undetected for years on the C2 and ORBs (proxy hops) of state hackers. This is how we follow their operations.

"This is how we steal their rivals' hacking tools and reverse-engineer them to create 'fingerprints' to help us detect them in the future.

"Here's where it gets interesting: the NSA is not made of magic. Our rivals do the same thing to us - and occasionally succeed. Knowing this, NSA's hackers (TAO) are told not to leave their hack tools ('binaries') on the server after an op. But people get lazy.

"What's new? NSA malware staging servers getting hacked by a rival is not new. A rival publicly demonstrating they have done so is. Why did they do it? No-one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack."

Snowden suggested that the security services of his current hosts, Russia, are behind it.

8) Circumstantial evidence and conventional wisdom indicates Russian responsibility. Here's why that is significant:

— Edward Snowden (@Snowden) August 16, 2016

9) This leak is likely a warning that someone can prove US responsibility for any attacks that originated from this malware server.

— Edward Snowden (@Snowden) August 16, 2016

"That could have significant foreign policy consequences. Particularly if any of those operations targeted US allies [and] particularly if any of those operations targeted elections. Accordingly, this may be an effort to influence the calculus of decision-makers wondering how sharply to respond to the DNC hacks," he said.

"TL;DR: this leak looks like somebody sending a message that an escalation in the attribution game could get messy fast.

"Bonus: when I came forward, NSA would have migrated offensive operations to new servers as a precaution - it's cheap and easy. So? So the undetected hacker squatting on this NSA server lost access in June 2013. Rare public data point on the positive results of the leak."

He signed off on the series of tweets: "You're welcome, @NSAGov. Lots of love."

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Government
  • Privacy
  • Government

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017