Jezper - Fotolia

Get started Bring yourself up to speed with our introductory content.

Risk & Repeat: Equation Group hack raises questions for NSA

Listen to this podcast

In this Risk & Repeat podcast, SearchSecurity editors discuss the mystery behind the recent Equation Group hack and the motives and identity of the Shadow Brokers.

The Equation Group hack, which led to the release of zero-day vulnerabilities and tools, has led to questions for the National Security Agency and its reported connections to the advanced persistent threat group.

A group calling itself the Shadow Brokers recently posted evidence of a collection of Equation Group cyberweapons and zero-day flaws with the intention of auctioning them off for 1 million bitcoin. To complicate matters further, the tools and vulnerabilities in the auction have been tied to the NSA's Tailored Access Operations division.

As concerns over the NSA's involvement with the Equation Group have risen, questions about the Shadow Brokers' identity and motives have swirled. Who is behind this Shadow Brokers group? Is the bitcoin auction legitimate or just a ruse? Are there political motivations behind this Equation Group hack?

In this episode of SearchSecurity's Risk & Repeat podcast, editors Rob Wright and Peter Loshin discuss those questions, as well as the history of the Equation Group and what this hack means for IT vendors as well as the NSA.

Next Steps

Risk & Repeat: Black Hat 2016 highlights and trends

Risk & Repeat: Malicious Tor nodes discovered

Risk & Repeat: ASN.1 compiler flaw raises concern

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Who do you think is behind the Shadow Brokers, and what do you think their motive is?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close