Previous All Posts Next

Snowden Reacts to NSA Shadow Brokers Hack

Posted: August 17, 2016 to News.

Tags: Malware, Data Breach, Cloud Security

Yesterday we told you about a group of hackers calling themselves The Shadow Brokers auctioning off files they stole from a clandestine branch of the NSA called the Equation Group. The Equation Group was identified as part of the NSA thanks to files released by Edward Snowden, and now he’s speaking out about the hack. According to Snowden in a series of Tweets, having a group of hackers infiltrate a NSA staging server isn’t an unprecedented occurrence, it’s the making a public showing of it that is. The NSA has a practice called Counter Computer Network Exploitation where it traces and targets the servers that state hackers use to launch malware campaigns, as do other countries. Basically it’s how we steal our rival’s hacking tools in order to reverse engineer them so we can detect them being used against us in the future. NSA hackers are told not to leave their hacking tools on a server after an operation, because occasionally hackers do get in and the NSA doesn’t want their tools compromised. Unfortunately, sometimes people get lazy. So why publicize it? In Snowden’s opinion and in light of the DNC hack, the reason may have more to do with diplomacy. The idea is that with all evidence pointing to Russia as responsible, publicizing the hack on the NSA is a warning that someone can prove any hack that originated from this particular NSA server. This could have significant foreign policy repercussions if it shows the NSA was behind hacks of US allies or targeted foreign elections. While it’s impossible to know for sure, Snowden’s thinking is that whoever got into the NSA server is sending a message not to push too hard in retaliation for the DNC hack. He believes that they are saying that doing so will end up with fingers being pointing at the US spy agency as well.

Related Resources

Learn more about how Petronella Technology Group can help:

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Need Cybersecurity or Compliance Help?

Schedule a free consultation with our cybersecurity experts to discuss your security needs.

Schedule Free Consultation
Previous All Posts Next
Free cybersecurity consultation available Schedule Now