Episode

53: Shadow Brokers
listen on Spotify
53:04
Published: Tue Dec 10 2019
Description

The NSA has some pretty advanced, super secret, hacking tools. What if these secret hacking tools were to end up in the wrong person’s hands? Well, that happened. Guest Thanks to Jake Williams from Rendition Security for telling us the story. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
The NSA's ANT catalog contains a list of real hacks, exploits, and cyber surveillance devices that agents can use for certain missions, and was leaked to journalists at Der Spiegel by someone with access to NSA documents.
00:00 - 01:58 (01:58)
listen on Spotify
NSA
Summary

The NSA's ANT catalog contains a list of real hacks, exploits, and cyber surveillance devices that agents can use for certain missions, and was leaked to journalists at Der Spiegel by someone with access to NSA documents.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
DRADA offers cloud compliance software to monitor and ensure continuous safety and compliance with various industry standards.
01:58 - 08:38 (06:40)
listen on Spotify
Cloud Compliance, Hacking Campaigns
Summary

DRADA offers cloud compliance software to monitor and ensure continuous safety and compliance with various industry standards. Hacking campaigns are often given unique code names to determine the source of an attack.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The president of Rendition Security, Jake Williams, explains his analysis of Shadowbrokers cyberattack, in which stolen cyber weapons from the NSA were released and auctioned off.
08:38 - 16:33 (07:54)
listen on Spotify
Cybersecurity
Summary

The president of Rendition Security, Jake Williams, explains his analysis of Shadowbrokers cyberattack, in which stolen cyber weapons from the NSA were released and auctioned off.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
Researchers analyzed the list of IP addresses from the second dump by the Shadow Brokers, which claimed to be servers infected or used by the NSA for launching exploits, and looked for connections with clients through NetFlow data analysis.
16:33 - 20:53 (04:19)
listen on Spotify
Data Security
Summary

Researchers analyzed the list of IP addresses from the second dump by the Shadow Brokers, which claimed to be servers infected or used by the NSA for launching exploits, and looked for connections with clients through NetFlow data analysis.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The timing of the Shadow Brokers dumps coincides with periods of Russian hacking being in the news, potentially diverting attention away from the latter.
20:53 - 31:43 (10:50)
listen on Spotify
Shadow Brokers
Summary

The timing of the Shadow Brokers dumps coincides with periods of Russian hacking being in the news, potentially diverting attention away from the latter. The Shadow Brokers' operations have been suggested to be either a Russian operation or in the interest of Russia.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The transcript discusses the impact of being outed as the Shadow Brokers, including the potential deterrent effect it could have on others who may consider commenting on former NSA employees and the lack of real content in a rewritten article.
31:43 - 37:55 (06:11)
listen on Spotify
Shadow Brokers
Summary

The transcript discusses the impact of being outed as the Shadow Brokers, including the potential deterrent effect it could have on others who may consider commenting on former NSA employees and the lack of real content in a rewritten article.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The speaker speculates the possibility of US nation-state hackers being indicted, and also discusses the consequences of hackers on the Cyber's Most Wanted list traveling to or through countries with extradition treaties with the US.
37:55 - 43:31 (05:35)
listen on Spotify
Cybersecurity
Summary

The speaker speculates the possibility of US nation-state hackers being indicted, and also discusses the consequences of hackers on the Cyber's Most Wanted list traveling to or through countries with extradition treaties with the US.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The hacker who deleted their login events but not their logout events and may have cleared all event logs is believed to be inexperienced in using Shadow Brokers' hacks.
43:31 - 50:29 (06:58)
listen on Spotify
Cybersecurity
Summary

The hacker who deleted their login events but not their logout events and may have cleared all event logs is believed to be inexperienced in using Shadow Brokers' hacks. Their intent may be to contest the NSA's most sophisticated hacking group and burn some of their costly exploits.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The leak of hacking tools by the Shadow Brokers gave government hacking teams a chance to analyze the exploits and use them in their own operations.
50:29 - 53:04 (02:35)
listen on Spotify
Cybersecurity
Summary

The leak of hacking tools by the Shadow Brokers gave government hacking teams a chance to analyze the exploits and use them in their own operations. As a result, digital forensics and incident responder teams have seen an increase in attacks using similar tools.

Episode
53: Shadow Brokers
Podcast
Darknet Diaries