Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Not long ago, a group referring to itself as the Shadow Brokers distributed hacking tools utilized by the United States National Security Agency (NSA), on various publically-accessible websites. While the motives of the Shadow Brokers are a story for another time, an investigation seems to have locked in on a particular theory of how the Shadow Brokers came into possession of the tools in the first place.

Hypotheses were initially varied as to how the tools were taken from the NSA at all. Some surmised that the leak must have been the work of another agency insider following the lead of the controversial Edward Snowden. Some suspected that Russia, deemed responsible by D.C. lawmakers, had hacked into the NSA headquarters located in Fort Meade.

However, the FBI has begun to focus their efforts on an entirely different source, one that--while certainly less openly malicious than a foreign attack or insider leak--still shows the dangers that human error can present to cyber security.

Based on information provided by the NSA, investigators are looking into reports that an individual associated with the agency, either as an employee or a contractor, had left the tools on a remote computer during an operation approximately three years ago. These tools would allow their users to exploit systems from Fortinet Inc. and Cisco Systems.

Patches have since been released to help protect these systems from the now-public tools. Investigators, however, are not ruling out the possibility that the tools were left exposed on purpose, or that others within the NSA made similar mistakes that ultimately resulted in the Shadow Brokers obtaining them.

To their credit (assuming that it was an honest mistake), the unnamed individual reported their mistake shortly afterwards, according to the NSA--which, it must be mentioned, did not inform the companies of the risk to their systems. Rather, having sought out foreign use of the tools with no results, the NSA saw no need to inform the software manufacturers.

Regardless of blame for the release of these tools into the public domain, the unnamed former NSA representative who left the tools on the remote computer proves that critical data should never leave the safety measures to be found on-premises and taken into the world without considerable measures put in place to ensure its security.

For advisement and assistance in putting measures in place to protect your business from theft, call Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 14 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Computer Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Network Security Ransomware Hardware Office Backup Apps Business Continuity Disaster Recovery Operating System Communication Hacking WiFi The Internet of Things Social Media Facebook Bandwidth Microsoft Office Network Smartphones Firewall Managed Service Provider Content Filtering Cybercrime Outlook Website Wireless Technology Android Apple Employer-Employee Relationship History Two-factor Authentication Best Practice Small Business Phishing Alert App Networking Data storage Mobile Computing Data Big Data Windows communications Experience Safety Unified Threat Management Quick Tips Mobile Device Management Money Business Growth Remote Computing Data Management Shortcut Advertising Recovery Robot DDoS Society Heating/Cooling Sports Word Retail Google Wallet Spam Information Technology Running Cable Windows 8 Internet of Things Business Management IT Services Managed IT services Hosted Solution Windows XP Artificial Intelligence Competition Documents Tech Support Presentation Compliance Entrepreneur Bluetooth Drones Domains Social Printer Hacker Browser Automation Wireless Memory Virtual Desktop Unified Communications Application Securty Document Management Customer Service Encryption Deep Learning VoIP BDR Law Enforcement SaaS Proactive IT Router Cortana Vendor Management Network Congestion Office 365 Save Money Saving Money Music Analytics Monitors intranet Lithium-ion battery Cryptocurrency Laptop IBM Displays Education Social Networking Google Docs Cleaning Public Speaking Holiday Processors End of Support Black Market IP Address YouTube Virtualization LiFi Staffing Office Tips BYOD Downtime Government Help Desk Writing Passwords Augmented Reality Streaming Media Keyboard Visible Light Communication User Disaster Micrsooft Search Hard Drives
QR-Code