- American’s Safety Has Been Hacked (Image: MGN)
- The NSA was just hacked by a new group called the “Shadow Broker.”
- The group released coding for a malware software that the NSA developed.
- The software, called SECONDDATE, would intercept information and send it to an NSA-run server and infect it with malware then deliver it back to its original site before it could be detected.
- The NSA admitted to using the software on the site “cnn.com.”
A group called the “Shadow Broker,” a never before seen group, recently came forward and claimed to have hacked the NSA. The group announced that it was in possession of malware software that had been developed by the National Security Agency. Of course, the agency quickly went into a panic to try and determine if the code that the group released was indeed their own.
At first, the validity of the coding was only assumed to be by the NSA. Yet, now, new information has confirmed that the code released by the “Shadow Broker,” is, in fact, authentic and from the National Security Agency. Documentation that was acquired by Edward Snowden seems to show that several elements in the coding that was released lines up with details from the agency’s own manuals and materials.
[wps_products_gallery product_id=”4334003716147, 4335189000243, 4347885715507″]
One specific manual instructs agents to us a 16- character string code “ace02468bdf13579,” to track a strain of government-created malware as it travels through different networks. That exact coding string shows up, character by character, in one of the leaked codes called SECONDDATE.
The agency is still trying to determine how the leak happened. Snowden said that it could have been found in an outside server that the agency used to infect a certain target. However, the NSA believes the leak came from a “rogue insider” because some of the leaked information would have never been found on an outside server.
Whoever hacked the server is unknown. Yet, it seems that the hacker group Anonymous may have some new competition in the world of cyber warfare.