{"id":32021,"date":"2018-03-07T08:09:44","date_gmt":"2018-03-07T13:09:44","guid":{"rendered":"http:\/\/olduvai.ca\/?p=32021"},"modified":"2018-03-07T08:09:44","modified_gmt":"2018-03-07T13:09:44","slug":"leaked-files-show-how-nsa-tracks-other-countries-hackers","status":"publish","type":"post","link":"https:\/\/olduvai.ca\/?p=32021","title":{"rendered":"Leaked Files Show How NSA Tracks Other Countries&#8217; Hackers"},"content":{"rendered":"<div class=\"Post-header\">\n<div class=\"Post-image-block\">\n<div class=\"ResponsiveImage Post-image\"><img loading=\"lazy\" decoding=\"async\" class=\"ResponsiveImage-image\" src=\"https:\/\/cdn01.theintercept.com\/wp-uploads\/sites\/1\/2018\/03\/AP_17159080143400-1520389252-article-header.jpg\" alt=\"FILE - In this June 6, 2013 file photo, the National Security Agency (NSA) campus in Fort Meade, Md. Some U.S. states are reviewing their election systems for signs of intrusion after a leaked NSA report describes a hacking effort by Russian military intelligence. There\u2019s no indication so far that potential intrusions affected voting or ballot counting. (AP Photo\/Patrick Semansky, File)\" width=\"1440\" height=\"720\" \/><\/div>\n<\/div>\n<div class=\"Post-header-grid\">\n<div class=\"Post-header-row\">\n<div class=\"PostSocial\">\n<div class=\"Post-social-container\">\n<div class=\"Post-social\">\n<div class=\"Post-social-grid\">\n<div class=\"Post-social-row\">\n<div class=\"Post-social-block\">\n<div class=\"Post-social-inner-block\">\n<div class=\"Post-social-link-block Post-social-link-block--comments\">AP<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Post-header-block\">\n<div class=\"Post-title-block\">\n<h3 class=\"Post-title\"><a class=\"Post-title-link\" href=\"https:\/\/theintercept.com\/2018\/03\/06\/leaked-files-show-how-nsa-tracks-other-countries-hackers\/\">LEAKED FILES SHOW HOW NSA TRACKS OTHER COUNTRIES\u2019 HACKERS<\/a><\/h3>\n<div class=\"PostByline byline\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Post-body\">\n<div class=\"Post-content-block-outer\">\n<div class=\"GridContainer Post-scroll-container\">\n<div class=\"GridRow\">\n<div class=\"Post-content-block\">\n<div class=\"Post-content-block-inner\">\n<div class=\"PostContent\">\n<div>\n<p class=\"gmail-p1\"><u>WHEN THE MYSTERIOUS<\/u> entity known as \u201cShadow Brokers\u201d released a tranche of stolen NSA hacking tools to the internet a year ago, most experts who studied the material honed in on the most potent tools, so-called \u201czero-day\u201d exploits that could be used to install malware and take over machines. But a group of Hungarian security researchers spotted something else in the data, a collection of scripts and scanning tools the NSA uses to detect other nation-state hackers on the machines it infects.<\/p>\n<p class=\"gmail-p1\"><span class=\"gmail-s1\">It turns out those scripts and tools are just as interesting as the exploits. They show that in 2013 \u2014 the year the NSA tools were believed to have been stolen by Shadow Brokers<span class=\"gmail-Apple-converted-space\">\u00a0 <\/span>\u2014 the agency was tracking at least 45 different nation-state operations, known in the security community as Advanced Persistent Threats, or APTs. Some of these appear to be operations known by the broader security community \u2014 but some may be threat actors and operations currently unknown to researchers.<\/span><\/p>\n<p class=\"gmail-p1\"><span class=\"gmail-s1\">The scripts and scanning tools dumped by Shadow Brokers and studied by the Hungarians were created by an NSA team known as\u00a0Territorial Dispute, or TeDi. Intelligence sources told The Intercept the NSA established the team after hackers, believed to be from China, <a href=\"http:\/\/www.cnn.com\/2009\/US\/04\/21\/pentagon.hacked\/\">stole designs for the military\u2019s Joint Strike Fighter plane<\/a>, along with other sensitive data, from U.S. defense contractors in 2007; the team was supposed to detect and counter sophisticated nation-state attackers more quickly, when they first began to emerge online.<\/span><\/p>\n<p class=\"gmail-p1\"><span class=\"gmail-s1\">\u201cAs opposed to the U.S. only finding out\u00a0in five years\u00a0that everything was stolen, their goal was to try to figure out when it was being stolen in real time,\u201d one intelligence source told The Intercept.<\/span><\/p>\n<p>&#8230;click on the above link to read the rest of the article&#8230;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>AP LEAKED FILES SHOW HOW NSA TRACKS OTHER COUNTRIES\u2019 HACKERS WHEN THE MYSTERIOUS entity known as \u201cShadow Brokers\u201d released a tranche of stolen NSA hacking tools to the internet a year ago, most experts who studied the material honed in on the most potent tools, so-called \u201czero-day\u201d exploits that could be used to install malware [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6],"tags":[2148,15007,551,577,15126,5567,827],"class_list":["post-32021","post","type-post","status-publish","format-standard","hentry","category-liberty","tag-hacking","tag-kim-zetter","tag-national-security-agency","tag-nsa","tag-shadow-brokers","tag-the-intercept","tag-united-states"],"_links":{"self":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/32021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=32021"}],"version-history":[{"count":1,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/32021\/revisions"}],"predecessor-version":[{"id":32022,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/32021\/revisions\/32022"}],"wp:attachment":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=32021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=32021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=32021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}