Bleeping Computer is among news outlets reporting The Shadow Brokers Announce Details About Upcoming Monthly Dump Service – its data-and-exploits-as-a-service forfor which the subscription price is 100 Zcash cryptocurrency (approximately $28,000 US) per month. When the Shadow Brokers recently teased the upcoming service, it indicated that among the service’s offerings would be web browser exploits, router exploits, mobile handset exploits and tools, items from newer Ops Disks, exploits for Windows 10, compromised network data from more SWIFT providers and central banks, and compromised network data from Russian, Chinese, Iranian, or North Korean nukes and missile programs. IT security experts from Balabit, Cyphort Labs and STEALTHbits Technologies commented below.
Csaba Krasznay, PhD, Product Evangelist at Balabit:
“Obviously, there are doubts regarding the truth behind the claimed new leaks, but the whole situation is really scary. In one hand, if the exploits are really existing and someone (or multiple parties) buys them, we may be faced with another Wannacry campaign as we can be sure that the buyer(s) will monetize those exploits. On the other hand, if the whole story is not true, Shadow Brokers’ questionable “reputation” may sufer, and it may seek to prove trustworthiness in another destructive way. Whatever the truth is, it is clear now that the governments should handle their cyberweapons in ways similar to the handling of their weapons of mass destruction. Otherwise, perhaps a disgruntled privileged administrator might steal one or perhaps someone may simply forget to delete it after use in an operation. Those codes shouldn’t get to a Shadow Broker-like group, and this is a governmental responsibility.”
Mounir Hahad, Ph.D., Senior Director at Cyphort Labs:
“It is evident from the last year that Shadow Brokers are trying various business models to see which one profits them. They have tried an auction sale, a direct sale and now a subscription model. None of the past models has generated any revenue for them, neither from government agencies interested in offensive security nor from security companies trying to build protections.
I suspect this new model will have better success given the price tag is much lower. My concern would be with rogue entities like cyber crime groups which now would have a more affordable access to weapons of choice. Some not-so-well funded foreign governments may dip their toes in as well.
I hope this approach won’t force the hands of security companies to join the feeding frenzy to avoid being the last one to know. Usually the industry is driven by a code of conduct that should prevent engaging in any shady activity and definitely not funding illegal activities.”
“The motives of the Shadow Brokers should receive far more scrutiny than it currently receives. Of the list of items that The Shadow Brokers have suggested would be a part of their monthly data and exploit dump service, compromised SWIFT network data is of the most value to both blackhat hackers and the impacted organizations. Zero-day exploits still do not account for the majority successful breach attack vectors, and they are, relatively speaking, already quite populous in both the dark and open web; comprised SWIFT networks on the other hand are what led to the $80 Million dollar digital heist last year that would have been 1 Billion dollars if not for a mere typo. So why would a group of hackers need to peddle exploits and the like if they have, at their disposal, the means to steal untold amount of money? I for one am very skeptical of the group and their motives.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.