Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak [threatpost.com]
Buckeye group used Equation Group tools prior to ShadowBrokers leakSecurity Affairs [securityaffairs.co]
Chinese spies acquired NSA tools, used them to attack US allies: report [thehill.com]
Attention Required! | Cloudflare [www.darkreading.com]
Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak [arstechnica.com]
Chinese Hackers Used NSA Tool a Year Before Shadow Brokers Leak [www.securityweek.com]
Chinese Hacker Crew Stole NSA Cyber Weapons In 2016-A Year Before They Were Leaked Online [www.forbes.com]
Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak [www.symantec.com]
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks [www.nytimes.com]
Symantec: NSA hacking tools fell into the hands of Chinese spies [siliconangle.com]
TheShadowBrokers first appeared in August 2016 https://t.co/FdXtXq1hD3 - so if, according to Symantec, the first appearance of the 2017 release is in March 2016, I'm really looking forward to the USG commentary. https://t.co/GNpdbsN9Ol
— Matt Suiche (@msuiche) May 7, 2019
Remember when India and Pakistan did that with an office 0day? It was discovered by one side, then repackaged and sent back the other way. lol https://t.co/geg9FfAOZF
— thaddeus e. grugq (@thegrugq) May 7, 2019
Exploits are, in effect, "secret weapons", with all that that implies: once deployed, they don't stay secret for long (especially when used against sophisticated targets). Once this happens, only sensible policy is to disclose/fix underlying vul. https://t.co/qWAIneoxXa
— matt blaze (@mattblaze) May 7, 2019
very cool that everything snowden warned us about is just being directed back at the US https://t.co/qjKouyuGcr
— Brendan Karet ? (@bad_takes) May 7, 2019
“The losses have touched off a debate within the intelligence community over whether the United States should continue to develop some of the world’s most high-tech, stealthy cyberweapons if it is unable to keep them under lock and key.” https://t.co/rmYA6mEIwX
— Justin Cauchon (@Cauchon) May 6, 2019
how many different ways can NSA tools gets pwned? or as symantec's eric chien puts it, "I can’t think of another case where something like this has ever happened" https://t.co/Xtj4yt003p
— Lily Hay Newman (@lilyhnewman) May 7, 2019
Apparently the NSA tried to hack Chinese systems with a zero day, but Chinese intelligence intercepted and used it on US allies instead.https://t.co/YD7NsnTqMU
— MalwareTech (@MalwareTechBlog) May 7, 2019
Symantec announces that a Chinese APT group was using EternalRomance and EternalSynergy before being released by the Shadow Brokers. This completely kills the NOBUS argument and raises some serious questions about the Vulnerability Equities Process (VEP). https://t.co/seXMs8bHuw
— Jake Williams (@MalwareJake) May 7, 2019
A hackable flaw in Microsoft's code was exploited by the NSA, intercepted by China, later stolen and leaked by another mysterious hacker group, and ultimately used by North Korea and Russia in two of the most damaging and costly cyberattacks in history. https://t.co/OA8A8fys4D
— WIRED (@WIRED) May 7, 2019
New from Symantec: Chinese government hackers acquired powerful NSA tools and used them in cyberattacks on targets in Belgium, Hong Kong, Luxembourg, the Philippines and Vietnam: https://t.co/q5R41VLhkU
— Eric Geller (@ericgeller) May 7, 2019
This happened a year before Shadow Brokers leaks. Unclear how. pic.twitter.com/XEKcxQhFaP
Hacking group linked to China's Ministry of State used stolen NSA hacking tools against targets in HK, Philippines, and Europe a year before the Shadow Brokers (Russia) released them to the public. https://t.co/5ooYhva0FF
— Crispin Burke (@CrispinBurke) May 7, 2019
I've seen a lot of anti-NSA rants after the new @symantec report about EternalSynergy and DoublePulsar. Exploits serve an obvious purpose which we should all agree is valuable - gaining intelligence on those who wish us harm. Those arguments miss this. 1/9https://t.co/rzyP35QMWF
— Jake Williams (@MalwareJake) May 7, 2019
Chinese spies acquired NSA tools, used them to attack US allies: report.https://t.co/W0vpgLZ6nf
— MindFuror (@MindFuror) May 7, 2019
Chinese spies acquired NSA tools, used them to attack US allies: report https://t.co/3oVa8ryDVd
— ThunderB, Hineni (@ThunderB) May 7, 2019
Chinese spies acquired NSA tools, used them to attack US allies: report #china #cybersecurity #symantec https://t.co/Roy8ApDHpO
— Evan Kirstel (@evankirstel) May 7, 2019
Chinese spies acquired NSA tools, used them to attack US allies: report | TheHill https://t.co/4o7wZyinNw
— SUSAN S. MOSS??? (@smoss319) May 7, 2019
Chinese spies acquired NSA tools, used them to attack US allies: report https://t.co/X9GOaYyT2V
— Ed Wrather ❌ (@edwrather) May 7, 2019
America for sale?
— Seal Team Q (@SealTeam_Q) May 7, 2019
Who sold it?
Remember when Biden said the Chinese were “fine Folks”
Remember when the Chinese were able to “hack” (given access to) Hillary’s servers?
Remember????? https://t.co/WMsXIvTQaW pic.twitter.com/mxZPSOAmS4
How a Chinese Nation-State Group Reversed-Engineered NSA Attack Tools https://t.co/GPKlhA9ZWn
— BrianHonan (@BrianHonan) May 7, 2019
Based on the dates, it turns out the Obama Administration’s NSA was responsible for the “biggest operational mistakes ever.” https://t.co/QOvUyHViBm
— Michael Q Sullivan (@MQSullivan) May 7, 2019
I've seen a lot of anti-NSA rants after the new @symantec report about EternalSynergy and DoublePulsar. Exploits serve an obvious purpose which we should all agree is valuable - gaining intelligence on those who wish us harm. Those arguments miss this. 1/9https://t.co/rzyP35QMWF
— Jake Williams (@MalwareJake) May 7, 2019
Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak @arstechnica #CyberSecurity #Security #DataBreach #Technology #Business#Ransomware #Malware #education #SmallBusiness #GDPRhttps://t.co/Ri9BKnubwg
— NetConnect (@NetConnectNYC) May 7, 2019
Microsoft has confirmed to @SecurityWeek that CVE-2019-0703 has been exploited in attacks. The company blamed a clerical error and it has updated its advisory. https://t.co/klur4E4Eii
— Eduard Kovacs (@EduardKovacs) May 7, 2019
A Chinese threat actor was spotted using a tool attributed to the NSA-linked Equation Group more than one year prior to it being leaked by the mysterious Shadow Brokers, Symantec revealed ... via @securityweek #infosec #tech #TuesdayTravel https://t.co/g6tfMWZUxF
— AJ Durling (@Gurgling_MrD) May 7, 2019
Versions of #EquationGroup tools used by #Buckeye were different and newer than those released by #ShadowBrokers, indicating a different origin. Details: https://t.co/pUI7sICcIz #APT3 pic.twitter.com/bwlPtPiP1M
— Security Response (@threatintel) May 7, 2019
Woah. A Chinese hacking group was using NSA exploits a ~year before~ they were leaked publicly by the Shadow Brokers. Also had different variations to those linked, potentially pointing to another source https://t.co/eae3OgikFw pic.twitter.com/FwGpV37LbO
— Joseph Cox (@josephfcox) May 7, 2019
Probably the most interesting story of the day -
— Omri Segev Moyal (@GelosSnake) May 7, 2019
"Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak"https://t.co/fnxXcTRiF1 pic.twitter.com/3aqbdky6Ll
APT3 surprise - Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak https://t.co/z6aZb06dvB
— Kurt Baumgartner (@k_sec) May 6, 2019
Symantec announces that a Chinese APT group was using EternalRomance and EternalSynergy before being released by the Shadow Brokers. This completely kills the NOBUS argument and raises some serious questions about the Vulnerability Equities Process (VEP). https://t.co/seXMs8bHuw
— Jake Williams (@MalwareJake) May 7, 2019
How very GOTHIC: I recommend one reads this, the actual Symantec blog, rather than high-profile press coverage with galactic-scale flaws https://t.co/hFuRwoDviE
— Horkos (@WylieNewmark) May 7, 2019
REVEALED: Buckeye espionage outfit was using Equation Group tools at least a year prior to the Shadow Brokers leak. Read more: https://t.co/pUI7sICcIz #apt3 #equation #shadowbrokers pic.twitter.com/22MjJFJtSf
— Security Response (@threatintel) May 7, 2019
Never mind it came from this:https://t.co/XYXR2NDP48
— Nancy Williams (@NanabananaNancy) May 7, 2019
Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leakhttps://t.co/VzFKwrFRaO
— _Cryptome_ (@_cryptome_) May 7, 2019
Symantec finds Chinese APT group Buckeye (APT3, Gothic Panda) used Equation Group (NSA) tools well before they were leaked by the Shadow Brokers https://t.co/V1HD2W18Qh pic.twitter.com/8AY3fPwxPL
— Virus Bulletin (@virusbtn) May 7, 2019
https://t.co/1hHVn7G1PVhttps://t.co/eFKzwBJLXl
— Neutral8✗9eR (@0x009AD6_810) May 7, 2019
これって WannaCry アウトブレイク前 (もしかすると ShadowBrokers リークよりも前) の段階で既に DoublePulsar 感染ノードが大量に観測されていたことの原因だったりもするのでしょうかね... ?とても興味深いです
Huge....Chinese APT with NSA tools? Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak | Symantec Blogs https://t.co/6QoGR0IMnG
— Paul Triolo (@pstAsiatech) May 7, 2019
Exclusive: Symantec researchers believe not that the Chinese stole the code but captured it from an NSA attack on their computers, like a gunslinger grabbing an enemy rifle and blasting away @ScottShaneNYT @nicoleperlroth @SangerNYT https://t.co/leClnlnGDo
— Lara Jakes (@jakesNYT) May 7, 2019
China was attacked by NSA hackers -- and grabbed their hacking tools, then used them against many targets. A tale from the digital wild west, where there aren't a lot of rules. With @nicoleperlroth and @SangerNYT https://t.co/n9cVscFQTF
— Scott Shane (@ScottShaneNYT) May 7, 2019
Is Barack Obama ever going to be questioned about all the catastrophic, malevolent acts China undertook against us during his presidency, and why he did nothing about it? https://t.co/ALWYylcrlk
— Benjamin Weingarten (@bhweingarten) May 7, 2019
Apparently the NSA tried to hack Chinese systems with a zero day, but Chinese intelligence intercepted and used it on US allies instead.https://t.co/YD7NsnTqMU
— MalwareTech (@MalwareTechBlog) May 7, 2019
Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks - The New York Times https://t.co/WnCtDwBkYG
— Michael Ron Bowling (@mrbcyber) May 7, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/xmwfjs2hTU
— Steve Yates (葉望輝) (@YatesDCIA) May 7, 2019
Now this is interesting. Chinese hackers “captured” the NSA’s code during an attack on Chinese networks and repurposed it for use against US networks. https://t.co/rq6WogTCvG
— Mihir Shah (@elmihiro) May 7, 2019
It has become very clear that NSA has long operated on wildly inaccurate assumptions about its ability to maintain control of its exploits. Without that assumption, the case for maintaining them, at least for widely-used software, is frankly untenable. https://t.co/PYEDAW1QSp
— Julian Sanchez (@normative) May 7, 2019
“We need tech companies to create back doors in their products and give them to governments, because they’ll keep them safe” https://t.co/CiLccXzz6W pic.twitter.com/wv4wya4EUS
— Benedict Evans (@benedictevans) May 7, 2019
@NSAGov tried to hack Chinese systems...but Chinese intel intercepted, repurposed & used to attack us.#CyberInsecurity https://t.co/SvhcCqlUk6
— unR̶A̶D̶A̶C̶K̶ted (@JesselynRadack) May 7, 2019
“Repeatedly over the past decade, American intelligence agencies have had their hacking tools and details about highly classified cybersecurity programs resurface in the hands of other nations or criminal groups.” https://t.co/grdUY4GHc6
— Jerome Taylor (@JeromeTaylor) May 7, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/0Yg8LakRiF rather damning report on 1) NSA and 2) US "we will always win the cyberarmsrace so no treaty needed" stance. " Also...
— chinahand (@chinahand) May 7, 2019
Tell us again how the NSA is protecting us - How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/KpIx1mEmfN
— Mass. Pirate Party (@masspirates) May 7, 2019
A lot of unarticulated assumptions in this piece https://t.co/o0EgWRCobd
— Thomas Rid (@RidT) May 7, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/XzaxAH6Clc
— Zev Shalev (@ZevShalev) May 7, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/1KBomNN3YU
— Jeff DeRiso (@JeffDeRiso) May 7, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/WS2opEvRXn
— El_Grillo (@El_Grillo1) May 7, 2019
NEW: How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks w/ @ScottShaneNYT @SangerNYT https://t.co/9HGXMswqmy
— Nicole Perlroth (@nicoleperlroth) May 6, 2019
Sanger Watch: 2019.https://t.co/YDzZBtA6OX
— Joestradamus IV ? (@Joestradamus91) May 7, 2019
A leading cybersecurity firm found evidence Chinese intelligence operatives repurposed National Security Agency (NSA) hacking technology in 2016 to attack American allies and private firms in Europe and Asia.https://t.co/1krqXovxAo
— Stu Cvrk (@STUinSD) May 8, 2019
As early as 2016, Americans used NSA’s Hacking Tools to attack China. China used tools for reverse analysis and used it to attack the United States.
— blackorbird (@blackorbird) May 7, 2019
Wonderful.https://t.co/lbBEwwd8oWhttps://t.co/9wI2hlx0RX
Remember 2017 WannaCry and NotPetya that used the leaked NSA EternalBlue exploits? Looks like Chinese teams had it one year before. Could they recover it dynamically? Impressive. https://t.co/hK7CbjSGHW pic.twitter.com/BA8v8N0wXm
— Lukasz Olejnik (@lukOlejnik) May 7, 2019
Wow. Chinese hackers using ETERNAL* and other 0day exploits and equation group tools in 2016, a year before shadow brokers. The DOUBLEPULSAR version they used was more advanced than the shadow brokers' version.https://t.co/q2I4g8w7qIhttps://t.co/5HGy6KEE3s
— scriptjunkie (@scriptjunkie1) May 7, 2019
Buckeye Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak via @symantec https://t.co/crJtjY7rEA pic.twitter.com/8LUmV9cT8w
— Carl (@cybertechcarl) May 7, 2019
Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak | Symantec Blogs https://t.co/9XUKx1aBfD
— Hamid K (@hkashfi) May 7, 2019
Buckeye espionage group had access to Equation tools prior to the Shadow Brokers leak. These tools continued to be used, even after Buckeye's reported disappearance in mid-2017. Read more: https://t.co/pUI7sIkBR1 #apt3 #equation #shadowbrokers pic.twitter.com/G9clkZEyd4
— Security Response (@threatintel) May 7, 2019
That's interesting: the Chinese hacking group #Buckeye (China again) was using Equation Group tools to gain persistent access to target organizations at least a year prior to the Shadow Brokers leak. By @nicoleperlroth (welcome back!) ?https://t.co/3unn95AdN8
— Odisseus (@_odisseus) May 7, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/n303lhdJTG #infosec
— Ty (@tyrus_) May 7, 2019
Amazing story. As Hayden said elsewhere: "If they cannot protect the tools, I just can't mount the argument to defend that they should have them."
— Jack Goldsmith (@jacklgoldsmith) May 7, 2019
https://t.co/371AQede4c
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/M27jEJrhIQ
— Josh Caplan (@joshdcaplan) May 7, 2019
Are you kidding me? Gunslinger? So is this the NYT admitting that the US commits cyber attacks on Chinese infrastructure back to at least 2016? https://t.co/pkcrPWeHuA pic.twitter.com/dGY1F6tXPT
— Dave Ravicher (@Whtapl) May 8, 2019
#CyberDigest | How Chinese spies got the N.S.A.’s hacking tools, and used them for attacks | @nicoleperlroth @SangerNYT @ScottShaneNYT | https://t.co/4m2zbaeASJ
— ASPI Cyber Policy (@ASPI_ICPC) May 8, 2019
Wow.
— ?Fergus Ryan (@fryan) May 7, 2019
'Symantec believe the Chinese did not steal the code but captured it from an N.S.A. attack on their own computers — like a gunslinger who grabs an enemy’s rifle and starts blasting away.'
by @nicoleperlroth @ScottShaneNYT @SangerNYT https://t.co/3rdg17rfHN
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/mdSqWERpa2
— Farai Chideya (@farai) May 7, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks https://t.co/dbN0IFmTjv
— James Kraska (@JamesKraska) May 8, 2019
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks. When Chinese spies work directly for Democratic Senators who sit on the Intelligence oversight committee, keeping spy tools secure is no doubt harder. @SenFeinstein https://t.co/yjXLW8S7kN
— POTUS Press ✩ ?? (@POTUSPress) May 7, 2019
中国諜報機関がどのようにNSAのハッキング・ツールを入手し、サイバー攻撃に利用してきたのか
— 黒井文太郎 (@BUNKUROI) May 7, 2019
- The New York Times https://t.co/5u5gUtEody
NSA's cyberweapons hacked by the Chinese and used in cyberattacks. Blowback discovered by the same folks at Symantec who broke down the Stuxnet code. The wild west of cyber. No rules in a gunfight. Without treaties, chaos will continue. https://t.co/QCU4UeCQQd @ZeroDaysFilm
— Alex Gibney (@alexgibneyfilm) May 7, 2019
?️♂️#Symantec?How Chinese Spies Got the N.S.A.’s Hacking Tools?, and Used Them for Attacks?https://t.co/3x5rvhpVgZ pic.twitter.com/ggFT5SDreg
— WZor (@WZorNET) May 7, 2019