Follow Slashdot stories on Twitter


Forgot your password?
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:Link to files and simple summary (Score 1) 272

And here's the original message provided by The Shadow Brokers
The original URL hosting the file was taken down but it was mirrored here:
Shadow Broker Message

The text is below in case that mirror stops working too.

bitmessage = BM-NBvAHfp5Y6wBykgbirVLndZtEFCYGht8
i2p-bote = [removed to satisfy slashdot form validator]

Equation Group Cyber Weapons Auction - Invitation

!!! Attention government sponsors of cyber warfare and those who profit from it !!!!

How much you pay for enemies cyber weapons? Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.

Picture Urls
- ------------

File Urls
- ----------

Free Files (Proof)
- ------------------
sha256sum = [removed to satisfy slashdot form validator]
gpg --decrypt --output eqgrp-free-file.tar.xz eqgrp-free-file.tar.xz.gpg
Password = theequationgroup

Auction Files
- -------------
sha256sum = [removed to satisfy slashdot form validator]
Password = ????

Auction Instructions
- --------------------
We auction best files to highest bidder. Auction files better than stuxnet. Auction files better than free files we already give you. The party which sends most bitcoins to address: before bidding stops is winner, we tell how to decrypt. Very important!!! When you send bitcoin you add additional output to transaction. You add OP_Return output. In Op_Return output you put your (bidder) contact info. We suggest use bitmessage or I2P-bote email address. No other information will be disclosed by us publicly. Do not believe unsigned messages. We will contact winner with decryption instructions. Winner can do with files as they please, we not release files to public.

- ---
Q: Why I want auction files, why send bitcoin? A: If you like free files (proof), you send bitcoin. If you want know your networks hacked, you send bitcoin. If you want hack networks as like equation group, you send bitcoin. If you want reverse, write many words, make big name for self, get many customers, you send bitcoin. If want to know what we take, you send bitcoin.

Q: What is in auction files? A: Is secret. Equation Group not know what lost. We want Equation Group to bid so we keep secret. You bid against Equation Group, win and find out or bid pump price up, piss them off, everyone wins.

Q: What if bid and no win, get bitcoins back? A: Sorry lose bidding war lose bitcoin and files. Lose Lose. Bid to win! But maybe not total loss. Instead to losers we give consolation prize. If our auction raises 1,000,000 (million) btc total, then we dump more Equation Group files, same quality, unencrypted, for free, to everyone.

Q: When does auction end? A: Unknown. When we feel is time to end. Keep bidding until we announce winner.

Q: Why I trust you? A: No trust, risk. You like reward, you take risk, maybe win, maybe not, no guarantees. There could be hack, steal, jail, dead, or war tomorrow. You worry more, protect self from other bidders, trolls, and haters.

Closing Remarks

!!! Attention Wealthy Elites !!!

We have final message for "Wealthy Elites". We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what "Equation Group" can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? "Do you feel in charge?" Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?

bitmessage = BM-NBvAHfp5Y6wBykgbirVLndZtEFCYGht8
i2p-bote = [removed to satisfy slashdot form validator]

Comment Link to files and simple summary (Score 1) 272

The Shadow Brokers github repo was taken down but not before it was mirrored :)

Everything (that was made available in the sample tarball) is inside the Firewall folder.
Most of the human readable stuff is in Firewall/OPS and Firewall/SCRIPTS.

From the very little scanning I did, it seems most of the stuff is meant to attack Cisco PIX and Cisco ASA firewalls/routers.

There are quite a few scripts for preparing/setting up an ops terminal from which an antagonist can launch attacks.

One of the attack techniques involves instructing a pix/asa to fetch an implant over http (or ftp) from a web server running on an ops terminal.
So some of scripts install an http server (apache or tiny httpd) on the ops terminal.
The antagonist supplies the implant (the software bug) on the ops terminal.
Then they use vulnerabilities in the pix to instruct it to fetch the implant, upgrade the target's OS or load a module into the running system and then that gives them full access.

The binaries and implants are provided in the repo as well.

Comment Re:A lot of Pffle if you ask me (Score 1) 771

Presumably the lightning port doesn't break because nobody bothers plugging anything in because THE GOD DAMN CABLES ARE ALWAYS FUCKING BROKEN!

On the other hand, I have only ever seen one broken USB port in my life - be that A, B, C, mini or micro - and that wasn't on a device of mine. The occasional cable breaks, but that is when they are years old, not months (or less).

Submission + - Microsoft to Provide New Encryption Algorithm for the Healthcare Sector

An anonymous reader writes: The healthcare sector gets a hand from Microsoft, who will release a new encryption algorithm which will allow developers to handle genomic data in encrypted format, without the need of decryption, and by doing so, minimizing security risks. The new algorithm is dubbed SEAL (Simple Encrypted Arithmetic Library) and is based on homomorphic encryption, which allows mathematical operations to be ran on encrytped data, yielding the same results as if it would run on the cleartext version. Microsoft will create a new tool and offer it as a free download. They've also published the theoretical research. For now, the algorithm can handle only genomic data.

Submission + - Grow Your Daily Protein at Home With an Edible Insect Desktop Hive writes: Fast Coexist reports on the Edible Insect Desktop Hive, a kitchen gadget designed to raise mealworms (beetle larva), a food that has the protein content of beef without the environmental footprint. The hive can grow between 200 and 500 grams of mealworms a week, enough to replace traditional meat in four or five dishes. The hive comes with a starter kit of "microlivestock," and controls the climate inside so the bugs have the right amount of fresh air and the right temperature to thrive. If you push a button, the mealworms pop out in a harvest drawer that chills them. You're supposed to pop them in the freezer, then fry them up or mix them into soup, smoothies, or bug-filled burgers. "Insects give us the opportunity to grow on small spaces, with few resources," says designer Katharina Unger, founder of Livin Farms, the company making the new home farming gadget. "A pig cannot easily be raised on your balcony, insects can. With their benefits, insects are one part of the solution to make currently inefficient industrial-scale production of meat obsolete."

Of course, that assumes people will be willing to eat them. Unger thinks bugs just need a little rebranding to succeed, and points out that other foods have overcome bad reputations in the past. "Even the potato, that is now a staple food, was once considered ugly and was given to pigs," says Unger adding that sushi, raw fish, and tofu were once considered obscure products. "Food is about perception and cultural associations. Within only a short time and the right measures, it can be rebranded. . . . Growing insects in our hive at home is our first measure to make insects a healthy and sustainable food for everyone."

Comment Furthermore... (Score 1) 518

Furthermore...what percentage of Christians (or practicing members of other faiths) do you assume find this offensive. Do you presume to speak for all of them? Because otherwise you might be right to assume that no on cares regardless of your religion or the color of your skin. An important part of a modern society is the ability to peacefully coexist within a group with dissimilar beliefs. If your outlook is so threatened by a person wearing a colander, or a cartoon, or a editorial, or a different religion, perhaps you should more closely examine your own beliefs.

Slashdot Top Deals

Take an astronaut to launch.