• Home
  • News
    • Features
    • Latest/Upcoming Tech
    • Product Review
    • Tech Events
  • Technology
    • Computing
      • Hardware
      • Software
    • Mobile
      • Devices
    • Apps
      • Messaging App
  • Innovation
    • Startups
    • Smart Gadgets
    • Augmented Reality
    • Cloud Computing
  • Business
    • Internet Commerce
    • Tech Market
  • Tips & Tricks
  • Miscellaneous
    • Jobs / Career
    • Social Media
TheTechNews
  • Home
  • News
    • Features
    • Latest/Upcoming Tech
    • Product Review
    • Tech Events
  • Technology
    • Computing
      • Hardware
      • Software
    • Mobile
      • Devices
    • Apps
      • Messaging App
  • Innovation
    • Startups
    • Smart Gadgets
    • Augmented Reality
    • Cloud Computing
  • Business
    • Internet Commerce
    • Tech Market
  • Tips & Tricks
  • Miscellaneous
    • Jobs / Career
    • Social Media
Network & Security

The NSA was hacked, confirmed by the Snowden Documents

by Irene Adlaar
-- August 21, 2016
The NSA was hacked, confirmed by the Snowden Documents

If you are still suspicious about the latest NSA hack, then the Snowden Documents may clear all your confusion. The document states the presence of SECONDDATE, a special hacking program that has managed to by-pass numerous security systems throughout history.

The Shadow Brokers, another hacking group like OurMine, has already claimed to have instigated a cyber attack last weekend that was previously thought to be NSA themselves, by the majority.

Edward_snowden_hacktivist_the_technews

This hacktivist took over plenty of vital information and demanded 1 million bitcoin for recovering all the compromised data. The security analysts had been trying to find out any possible linkage with NSA; the Intercept, on the other hand, traced the references back to the NSA whistleblower, Edward Snowden.

edward_snowden_tweets_the_technews

The following lines have been taken from the given statement by The Intercept

“The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.”

The abrupt leakages of these not-to-be-meant for public eyes have given opportunities to further issues. Firstly, the hackers may have already used them and secondly, it is highly likely that increasing numbers of criminals will also be using them for attaining their motives successfully.

snowden_secret_reports_leaked_the_technews

All these leaked tools have the ability to let anyone bypass the security of any computer in the world without the victims even realizing it.

Snowden also mentioned about numerous rivals of NSA who may have had carried out the attack. And The Intercept talked about a program called SECONDDATE, which has attacked a uncountable number of computer systems located globally. The leaked documents revealed that this tool has been primarily designed for keeping track of Pakistan and Lebanon’s activities.

For extensive details, you can read the document by clicking here.

Feel free to add your thoughts under our Comments section as TTN would love to hear from you.

ringid
Related Itemsedward snowdenFeaturedhackleaked informationNSANSA hackedOurMineShadow BrokersSnowdenSnowden documents
Click to add a comment
Network & Security
August 21, 2016
Irene Adlaar @https://twitter.com/rafaakabir

I am a seeker of the unknown and believer of truth.

Related Itemsedward snowdenFeaturedhackleaked informationNSANSA hackedOurMineShadow BrokersSnowdenSnowden documents

More in Network & Security

Top 5 (REALLY FREE) Antivirus for Windows in 2020!

Emily ForbesAugust 19, 2020
Read More
broadband_internet_connection_the_technews

VPN Speed Testing – How To Increase It?

Emily ForbesApril 14, 2020
Read More
most_essential_programming_languages_the_technews

Computer Network Security: How to Protect Your Computer Network!

Emily ForbesApril 10, 2020
Read More
introducing-fbis-most-wanted-cybercriminals

What to Look at When Examining Different VPNs!

Emily ForbesApril 9, 2020
Read More
securing_data_hackers_the_technews

12 Expert Data Breach Prevention Tips!

Emily ForbesApril 4, 2020
Read More

Your Beginners Guide to The Most Privacy-Minded VPNs!

Emily ForbesDecember 11, 2019
Read More
photonic neural network

SD-WAN: Simplifying the Branch Network Stack!

Emily ForbesNovember 16, 2019
Read More

How to Choose the Best Dedicated Server!

Emily ForbesNovember 14, 2019
Read More
Cybersecurity-news-technews

Cybersecurity Is About To Explode. Here’s Why?

Emily ForbesAugust 17, 2019
Read More
Scroll for more
Tap

Join Our Newsletter

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

we respect your privacy and take protecting it seriously

Top News

  • ftp-meaning-technews
    5 Factors to Consider Before Starting a Remote Business!
    BusinessFebruary 27, 2021
  • big-data-experts
    Reasons Why Organizations Need Modern Integration Platforms!
    Big DataFebruary 18, 2021
  • best_practices_online_business_the_technews
    Implement Business Analytics and Cut Costs!
    BusinessFebruary 18, 2021
  • Effective SEO Techniques to Drive Traffic to Your Website Today!
    Tips & TricksFebruary 17, 2021
  • The Internet of Things in 2021!
    InnovationFebruary 16, 2021
  • Can You Eliminate Shipping Damage?
    InnovationFebruary 15, 2021
  • SmileDirectClub Partners with MetLife to Democratize Orthodontic Care
    Health & FitnessFebruary 14, 2021
TheTechNews

A technology media that aims at the latest tech news, events, gadgets, tools, innovations, startups and many more.

    NEWS

  • Features
  • Latest/Upcoming Tech
  • Product Review
  • Tech Events
  • Technology
  • Innovation
  • Business

    Hardware & Software

  • Computing
  • Hardware
  • Software
  • Mobile
  • Devices
  • Messaging App
  • Tips & Tricks

    Others

  • Startups
  • Cloud Computing
  • Social Media
  • Internet Commerce

Copyright © 2016 www.thetechnews.com | Pages: ABOUT US | PRIVACY POLICY | TERMS OF USE | CONTACT US

Company offers up to $ 500,000 reward for iOS 9.3 Zero-day
Hackers can fool the facial recognition system using the 3D faces based on Facebook photos