A cache of powerful hacking tools used by the National Security Agency have leaked online
in what could be the biggest blow to the agency since 2013, when Edward Snowden came forward with documents that exposed the scope of its surveillance capabilities.
The leak raises new questions about how the NSA uses its offensive hacking ability and whether its approach ultimately leaves everyday users, not just the agency's targets, at risk.
Here's what you need to know about the leak:
Over the weekend, a group calling itself the Shadow Brokers posted online what it claims is a trove of malware used by the Equation Group - a code name for hackers that cybersecurity researchers have linked to the NSA.
The 300-some megabytes of information appear to date to 2013 and is allegedly just a free taste of a larger trove that the Shadow Brokers will release once a digital "auction" for the information is held. The group is asking for 1 million Bitcoins - or about a half-billion dollars - before they will let it all loose. However, many experts are skeptical of the auction.
"It's designed to distract. It's total nonsense," Nicholas Weaver, a computer security researcher at the University of California at Berkeley, told The Washington Post's Ellen Nakashima.
Weaver said bitcoin "is so traceable that a Doctor Evil scheme of laundering $1 million, let alone $500 million, is frankly lunacy."
What do these tools actually do?
The files contain what appears to be part of a sophisticated cyber arsenal. Among the digital weapons are "exploits" - hard-to-develop tools used for penetrating and taking over firewalls made by companies, such as Cisco and Fortinet, that are commonly used to protect computer networks.
There are also "implant" tools that can help hackers do things like siphon out or modify information on a system once they've broken in.
Several of the tools relied on previously unknown - or "zero-day" - bugs in software that appear to remain vulnerable now.
How sure are we that these tools actually belonged to the NSA?
They seem pretty legit. Although the NSA is staying mum, former NSA hackers told The Post that they appeared legitimate - as have other outside experts. Some file names from the cache also match up with programs or tools previously referenced in Snowden's revelations.
"Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff," Weaver told The Post.
But it's not clear that the NSA at large was hacked. Instead, an NSA operator may have mistakenly uploaded a full tool set to a proxy server that the agency used to carry out infiltrations, experts told The Post.
So who are these Shadow Brokers? The group's name appears to be a reference to a character in the "Mass Effect" video games who sells off information to the highest bidder.
But many, including Weaver and Snowden, say Russia is behind the leak. While there's no hard evidence connecting Russia to the data as of now, on Twitter, Snowden argued that Russia may have released the cache to wave the U.S. government away from officially blaming hacks against the Democratic National Committee and other political organizations on the country.
Putting the tools out there "is likely a warning that someone can prove U.S. responsibility for any attacks that originated from" the server that hosted them, he said. That could have major diplomatic fallout if, for instance, the tools were linked to spying on U.S. allies, Snowden argued.
WikiLeaks also tweeted that it had a full copy of the NSA tools cache that it would soon put up online, which may bolster the Russia theory. WikiLeaks posted Democratic National Committee files online last month, which many suspect came from Russian cyberattacks on the party organization.
Are the tools still out there online? What does this mean for my security?
Yes. The Shadow Brokers put the files online in a few different ways, including using a peer-to-peer file sharing method called bittorrent - which makes it very hard, if not impossible, to delete them from the Web.
That's bad news for user security: For one, these tools are now available to criminal hackers.
But secondly, the leak raises questions about how the government handles zero-day vulnerabilities. There's an official process called an equities review that the government uses to weigh when it will tell software makers about security problems it discovers in their products.
But the exact process is murky - and critics of the NSA have long suspected that the agency hoards undisclosed vulnerabilities to use in its information-gathering efforts. The reliance on zero-day bugs that remain unpatched today by the leaked tools suggest that the agency sat on problems for years.
When those problems go unfixed, it leaves everyday people vulnerable because other hackers might find and exploit the same issues. This new leak seems to prove that other people can find the same vulnerabilities as the NSA - and in some cases, even gain access to the same tools the agency uses to exploit them.
© 2016 The Washington Post