Was an NSA server hacked? Edward Snowden thinks so

US News August 16, 2016
On Monday, a group called Shadow Brokers claimed to have hacked the NSA, and said they would auction off NSA "cyber weapons" they discovered in the hack. News of the leak prompted Edward Snowden, who famously copied and released classified NSA documents, to give his theory on the latest hacking scandal.

Github has entirely censored the release of data showing proof of NSA malware targetting Cisco & others.

132 replies 3,705 retweets 3,488 likes

We had already obtained the archive of NSA cyber weapons released earlier today and will release our own pristine copy in due course.

130 replies 2,899 retweets 3,918 likes

The hack of an NSA malware staging server is not unprecedented, but the publication of the take is. Here's what you need to know: (1/x)

98 replies 3,309 retweets 4,034 likes

1) NSA traces and targets malware C2 servers in a practice called Counter Computer Network Exploitation, or CCNE. So do our rivals.

20 replies 1,316 retweets 1,536 likes

2) NSA is often lurking undetected for years on the C2 and ORBs (proxy hops) of state hackers. This is how we follow their operations.

17 replies 1,272 retweets 1,454 likes

3) This is how we steal their rivals' hacking tools and reverse-engineer them to create "fingerprints" to help us detect them in the future.

10 replies 1,240 retweets 1,452 likes

4) Here's where it gets interesting: the NSA is not made of magic. Our rivals do the same thing to us -- and occasionally succeed.

22 replies 1,251 retweets 1,581 likes

5) Knowing this, NSA's hackers (TAO) are told not to leave their hack tools ("binaries") on the server after an op. But people get lazy.

29 replies 1,170 retweets 1,479 likes

6) What's new? NSA malware staging servers getting hacked by a rival is not new. A rival publicly demonstrating they have done so is.

22 replies 1,457 retweets 1,613 likes

7) Why did they do it? No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack.

19 replies 1,196 retweets 1,460 likes

8) Circumstantial evidence and conventional wisdom indicates Russian responsibility. Here's why that is significant:

33 replies 1,143 retweets 1,336 likes

9) This leak is likely a warning that someone can prove US responsibility for any attacks that originated from this malware server.

27 replies 1,734 retweets 1,923 likes

10) That could have significant foreign policy consequences. Particularly if any of those operations targeted US allies.

19 replies 1,295 retweets 1,539 likes

11) Particularly if any of those operations targeted elections.

31 replies 1,242 retweets 1,619 likes

12) Accordingly, this may be an effort to influence the calculus of decision-makers wondering how sharply to respond to the DNC hacks.

27 replies 1,125 retweets 1,421 likes

13) TL;DR: This leak looks like a somebody sending a message that an escalation in the attribution game could get messy fast.

66 replies 1,865 retweets 2,288 likes

Bonus: When I came forward, NSA would have migrated offensive operations to new servers as a precaution - it's cheap and easy. So? So...

27 replies 982 retweets 1,415 likes

The undetected hacker squatting on this NSA server lost access in June 2013. Rare public data point on the positive results of the leak.

40 replies 1,255 retweets 2,026 likes

You're welcome, . Lots of love.

203 replies 2,474 retweets 6,390 likes

Given the leak, we know NSA has had huge permissions & USB drive management issues - so the insider theory should not be dismissed

2 replies 28 retweets 58 likes