Skip to main content

Hacking group says list features servers infiltrated by National Security Agency

A hand on a laptop in a dark surrounding.
Image used with permission by copyright holder
The Shadow Brokers, a hacking group that allegedly hacked the NSA and leaked details on its hacking tools a few months ago, is back with more new data. This time it claims to have information on what organizations and systems the intelligence agency targeted and infiltrated.

In a new a blog post titled Trick or Treat?, and signed with the familiar encryption key from last time, the shadowy group claims to show a list of servers that have been hacked by the NSA, or more specifically Equation Group, a supposed NSA-affiliated group.

The list features 352 different IP addresses and 306 domain names, including many domains with .edu and .gov, suggesting universities and government agencies, along with a number of mail operators. The servers are spread across 49 countries including China (at the top of the list), India, Germany, Korea, Russia, and Japan among many others. Timestamps show that these servers were hacked between August 2000 and August 2010.

Also on the list are what appear to be names of hacking tools and operations such as “jackladder,” “incision,” and “sidetrack,” as well as on what servers there were used.

The Shadow Brokers’ blog post features some broken English about the U.S. elections and calls to disrupt it — “On November 8th, instead of not voting, maybe be stopping the vote all together?” it reads.

Security experts have met the list with some skepticism, in some cases pointing out that attribution in cyberattacks is always difficult, and that not all of these servers may have actually been attacked by the NSA.

“The Shadow Brokers continue to grapple for publicity and money. The list of servers is 9 years old, likely no longer exist or reinstalled,” said Kevin Beaumont, a security researcher, on Twitter. The group previously attempted to sell supposed NSA data for $600 million during the summer but found no takers.

My Hacker House, in its analysis, still advises caution to anyone who finds a familiar-looking server from their organization on the list and urges them to seek security help. “You may have inadvertently been hosting Equation Group APT cyberattacks from your environment.”

Jonathan Keane
Former Digital Trends Contributor
Jonathan is a freelance technology journalist living in Dublin, Ireland. He's previously written for publications and sites…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more