So even the NSA hacks machines from compromised servers in China and Russia. This is why attribution is hard.https://twitter.com/musalbas/status/793001139310559232 …
Je kan informatie over je locatie aan je Tweets toevoegen, bijvoorbeeld je stad of exacte locatie, via het web en applicaties van derden. Je kan altijd de locatiegeschiedenis van je Tweets verwijderen. Meer informatie
So even the NSA hacks machines from compromised servers in China and Russia. This is why attribution is hard.https://twitter.com/musalbas/status/793001139310559232 …
So the NSA hacked a British ISP (Colt) to use them as a guinea pig for covering their tracks.pic.twitter.com/hM4PgmPxps
Imagine the conversations going on right now at the hundreds of affected organisations. A seismic wave is ongoing.https://twitter.com/musalbas/status/793001139310559232 …
Interesting: the NSA hacked the Organization for the Prohibition of Chemical Weapons in 2000, before the Iraq war and Bush. cc @emptywheelpic.twitter.com/HOU5c1LwCo
I've seen conflicting stories on whether there were hacks into or hacks via. Is one or the other certain?
Both: in order to hack via a server (to use it for exploit staging), you typically would need to hack into it.
Thanks. So we wouldn't know whether it was staging or actual hack.
If they were using the server for staging exploits, then they would have had to actually hack it first.
All of these Equation Group targets were compromised between 2000 and 2010. Likely that most are cleaned up, unless they have disk backups.
The vast majority of these Equation Group targets seem to be running Solaris. A few running Linux or FreeBSD.
@Bernies4_Trump What does this all mean?
nsa pretending to b Russia 2 frame @wikileaks
here’s a better format: https://1drv.ms/x/s!ApIFwYHoi8aFiyZOiS9MC5oopuA2 …
nice work
Many Russian, Japanese, German & European servers... yet I see no French server
France has def. lost its influence on the worldwide scene!
interesting to see Saudi IPs featured there too " Atheer .Jeraisy Backbone route "http://pastebin.com/RK73grmu
Can this list be downloaded to add to IP blocklists?
@Tinolle The number of .edu/university servers here is interesting.
high bandwidth connections, poor security?
Who said poor security. NSA has zero days, work with vendors could have back doors.
for your targets,sure.But for your C&C infra you just need ppl who don't notice you using their resource
Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.