+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

Experts have two theories for how top secret NSA data was stolen - and both are equally disturbing

Aug 19, 2016, 01:40 IST

First Look/Trevor Paglen

In the wake of an unprecedented breach of hacking tools and exploits apparently stolen from the National Security Agency's elite hacking unit, experts are offering two competing theories on how it happened - and both are equally disturbing.

Advertisement

Some former agency employees believe the alleged group behind the leak, "Shadow Brokers," may have hacked an NSA server that had a top secret hacker toolkit left there by mistake.

Others believe the "Brokers" may be just a smokescreen for another possibility: An agency mole.

"The key thing I think people are missing is that [most are talking] about how someone hacked a command-and-control box somewhere on the Internet," Dave Aitel, an ex-NSA research scientist who now leads penetration testing firm Immunity, told Business Insider. "If you actually look at the files, it really doesn't seem like that is the case."

His remarks about looking at the files are interesting, especially in light of a post on Medium by Matt Suiche, the founder of Comae Technologies, who claimed he was contacted by a former NSA analyst who offered a somewhat-redacted image of an award citation received while working inside the agency for the US Army to prove his bona fides.

Advertisement

In the post about this "insider theory," Suiche's source said the supposed NSA toolkit usually sits on a physically-segregated network that never goes near the Internet. And even more interesting, the source says, is that when an NSA hacker - an operator working in what is called Tailored Access Operations (TAO) - is going to carry out a cyber attack on a target, he or she would grab the files from this offline repository and then change many of their filenames before they start.

"The file hierarchy and the unchanged file naming convention tends to say that the files were directly copied from its source," Suiche writes.

Aitel, the ex-NSA research scientist, agreed with that assessment as a valid possibility. Further, Aitel argued that putting those types of files up on a computer that an adversary could find is not a common practice.

"It's not from a [command-and-control] server," he said. "It's just not C2 server stuff. It's operational machine stuff. No one puts their exploits on a C2 server. That's not a thing."

A hacker works on his laptop in TaipeiThomson Reuters

Advertisement

'There's all kinds of ugly here'

If the leaked files didn't actually get hacked from a server on the Internet, then it's possible the NSA has another "insider threat" problem - an especially embarrassing prospect for a spy agency still reeling from the fallout surrounding documents taken by Edward Snowden. The former Booz Allen Hamilton employee who was contracted to work for NSA leaked an alleged 1.7 million documents to journalists in 2013 before eventually seeking asylum in Moscow, where he remains to this day.

"There's all kinds of ugly here," John Schindler, a former NSA analyst and counterintelligence officer, told Business Insider, speculating that "there's fear now that this will bring on a serious mole hunt - which, by the way, is completely necessary - but never fun for the workforce. This isn't an entertaining thing to have to worry about, 'is the guy or girl in the next cubicle a Russian spy?'"

The previously-unknown Shadow Brokers created a number of social-media accounts earlier this month on Reddit, Github, Twitter, and Imgur, before announcing on August 13 its "cyber weapon auction," which promised bidders a "full state sponsor tool set" from a hacking unit believed to be within the NSA known only as "The Equation Group."

It released a 234-megabyte archive on various file-sharing sites with one-half being free to view and use - which numerous experts say is legitimate - while the other half was encrypted. The winner of the auction, the group said, would get the decryption key.

A look inside the &quotfree" version of the toolkit leaked online by &quotShadow Brokers"Paul Szoldra/Business Insider

Advertisement

But an auction for hacking tools and exploits is not something that ever happens, experts say. Instead, exploits are bought and sold on the black market for hundreds of thousands and sometimes millions of dollars, in private.

Also interesting is a newly-released linguistic analysis of the group's announcement on Pastebin, a text-sharing site, in which it used broken English.

"He is a native English speaker who tried to pass himself off as a foreigner," Jeffrey Carr, a cybersecurity expert and CEO of Taia Global, told Business Insider.

The cybersecurity firm analyzed the text of the "Shadow Brokers" auction announcement and found evidence seeming to indicate the author (or authors) purposely tried to mislead readers in the way they wrote, which included inconsistent errors in the text.

"The cumulative effect of these multiple lines of evidence leads to the conclusion that the author is most likely a native speaker of US English who is attempting to sound like a non-native speaker by inserting a variety of random grammatical errors," wrote Dr. Shlomo Argamon, an expert on linguistics and the company's chief scientist.

Advertisement

So what does this all mean? As both ex-NSA employees and computer security professionals analyze the files leaked by "Shadow Brokers," it's becoming increasingly likely they are legitimate tools, exploits, and implants that were used by NSA hackers.

But at this point, the way they ended up getting out of NSA's grasp is not clear, and that's a big problem.

"If you don't know how it was lost, there's then a lot of panic in terms of what else is out there, particularly from a counterintelligence perspective," a source who previously worked as a hacker with NSA's Tailored Access Operations unit told Business Insider on condition of anonymity, in order to discuss sensitive matters. "Now you have to really worry, are all of my operations exposed? I think that's very concerning to people because they want to be covert and stealth."

The NSA did not immediately respond for comment.

NOW WATCH: I spent 37 consecutive days playing 'Pokémon GO' - here's what I did to catch 'em all

Please enable Javascript to watch this video
You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article