If you are still suspicious about the latest NSA hack, then the Snowden Documents may clear all your confusion. The document states the presence of SECONDDATE, a special hacking program that has managed to by-pass numerous security systems throughout history.
The Shadow Brokers, another hacking group like OurMine, has already claimed to have instigated a cyber attack last weekend that was previously thought to be NSA themselves, by the majority.
This hacktivist took over plenty of vital information and demanded 1 million bitcoin for recovering all the compromised data. The security analysts had been trying to find out any possible linkage with NSA; the Intercept, on the other hand, traced the references back to the NSA whistleblower, Edward Snowden.
The following lines have been taken from the given statement by The Intercept
“The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.”
The abrupt leakages of these not-to-be-meant for public eyes have given opportunities to further issues. Firstly, the hackers may have already used them and secondly, it is highly likely that increasing numbers of criminals will also be using them for attaining their motives successfully.
All these leaked tools have the ability to let anyone bypass the security of any computer in the world without the victims even realizing it.
Snowden also mentioned about numerous rivals of NSA who may have had carried out the attack. And The Intercept talked about a program called SECONDDATE, which has attacked a uncountable number of computer systems located globally. The leaked documents revealed that this tool has been primarily designed for keeping track of Pakistan and Lebanon’s activities.
For extensive details, you can read the document by clicking here.
Feel free to add your thoughts under our Comments section as TTN would love to hear from you.