{"id":2940,"date":"2018-03-08T08:09:51","date_gmt":"2018-03-08T14:09:51","guid":{"rendered":"http:\/\/www.the-internet-guy.com\/?p=2940"},"modified":"2018-03-08T08:09:51","modified_gmt":"2018-03-08T14:09:51","slug":"leaked-nsa-dump-also-contains-tools-agency-used-to-track-other-hackers","status":"publish","type":"post","link":"https:\/\/www.the-internet-guy.com\/?p=2940","title":{"rendered":"Leaked NSA Dump Also Contains Tools Agency Used to Track Other Hackers"},"content":{"rendered":"<p><a href=\"https:\/\/thehackernews.com\/2018\/03\/nsa-hackers-tracking.html\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"http:\/\/www.the-internet-guy.com\/wp-content\/uploads\/2018\/03\/nsa-hacking.png\" alt=\"\" \/><\/a><\/p>\n<blockquote><p>A years ago when the mysterious hacking group &#8216;<a href=\"https:\/\/thehackernews.com\/2017\/04\/nsa-hacking-tools.html\" target=\"_blank\" rel=\"noopener\">The Shadow Brokers<\/a>&#8216; dumped a massive trove of sensitive data stolen from the US intelligence agency NSA, everyone started looking for secret\u00a0<a href=\"https:\/\/thehackernews.com\/2016\/08\/nsa-hacking-tools.html\" target=\"_blank\" rel=\"noopener\">hacking tools and zero-day exploits<\/a>.<\/p>\n<p>A group of Hungarian security researchers from CrySyS Lab and Ukatemi has now revealed that the NSA dump doesn&#8217;t just contain zero-day exploits used to\u00a0<a href=\"https:\/\/thehackernews.com\/2016\/10\/nsa-shadow-brokers-hacking.html\" target=\"_blank\" rel=\"noopener\">take control of targeted systems<\/a>, but also include a collection of scripts and scanning tools the agency uses to track operations of hackers from other countries.<\/p>\n<p>According to a report\u00a0<a href=\"https:\/\/theintercept.com\/2018\/03\/06\/leaked-files-show-how-nsa-tracks-other-countries-hackers\/\" target=\"_blank\" rel=\"nofollow noopener\">published<\/a>\u00a0today by the Intercept, NSA&#8217;s specialized team known as\u00a0<b>Territorial Dispute<\/b>(TeDi) developed some scripts and scanning tools that help the agency to detect other nation-state hackers on the targeted machines it infects.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/thehackernews.com\/2018\/03\/nsa-hackers-tracking.html\">Leaked NSA Dump Also Contains Tools Agency Used to Track Other Hackers<\/a><\/em><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2940\" class=\"pvc_stats all  \" data-element-id=\"2940\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.the-internet-guy.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A years ago when the mysterious hacking group &#8216;The Shadow Brokers&#8216; dumped a massive trove of sensitive data stolen from the US intelligence agency NSA, everyone started looking for secret\u00a0hacking tools and zero-day exploits. A group of Hungarian security researchers from CrySyS Lab and Ukatemi has now revealed that the&hellip;<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/www.the-internet-guy.com\/?p=2940\">Read More<\/a><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2940\" class=\"pvc_stats all  \" data-element-id=\"2940\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.the-internet-guy.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-2940","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts\/2940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2940"}],"version-history":[{"count":1,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts\/2940\/revisions"}],"predecessor-version":[{"id":2942,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts\/2940\/revisions\/2942"}],"wp:attachment":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}