{"id":1243,"date":"2017-10-06T08:00:57","date_gmt":"2017-10-06T12:00:57","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/"},"modified":"2022-03-02T08:42:08","modified_gmt":"2022-03-02T13:42:08","slug":"who-are-the-shadowbrokers","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/","title":{"rendered":"Who are the ShadowBrokers?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-31100\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A.png\" alt=\"\" width=\"170\" height=\"170\" \/>The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It\u2019s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use.<\/p>\n<h3>Who are the ShadowBrokers?<\/h3>\n<p>There are several theories about who the members of this hacker group are &#8212; from National Security Agency (NSA) employees to Russian operatives &#8212; but all these theories are based on unreliable information. All we know for sure is that the ShadowBrokers are using social media to sell a seemingly endless trove of cybersecurity secrets.<\/p>\n<h3>What are they selling?<\/h3>\n<p>The ShadowBrokers\u2019 first auction was in August of 2016, promising in broken English that the highest bidder would receive security vulnerabilities on par with government cyber weapons. Over the year that followed, the ShadowBrokers used auctions, crowdfunding, and direct sales to release vulnerabilities that all seemed to come from the NSA.<\/p>\n<p>In April of 2017, the fifth release went public and was characterized by one security expert as \u201cthe most damaging thing I&#8217;ve seen in the last several years.\u201d It included the ETERNALBLUE Windows vulnerability that allowed WannaCry to infect over 300,000 computers in a single day.<\/p>\n<h3>The September 2017 release<\/h3>\n<p>In a recent announcement, the ShadowBrokers announced a subscription service that will include access to bi-monthly security exploit releases. The first package included an NSA exploit named UNITEDRAKE, which allows hackers to remotely monitor or control a computer running any of the following versions of Microsoft\u2019s operating system:<\/p>\n<ul>\n<li>Windows XP<\/li>\n<li>Windows Vista<\/li>\n<li>Windows Server 2003\/2008\/2012<\/li>\n<li>Windows 7 (if no updates have been installed)<\/li>\n<li>Windows 8<\/li>\n<\/ul>\n<p>The UNITEDRAKE exploit can secretly record audio from your microphone, video from your webcam and anything that is typed while you are logged in. It can also remove itself from the target computer leaving no signs of a breach.<\/p>\n<h3>How to protect yourself from ShadowBrokers releases<\/h3>\n<p>To date, all the known NSA security exploits and ShadowBrokers releases have targeted older and outdated versions of software. The best thing you can do to protect your computers is keep your operating systems and software applications patched with the most recent vendor updates.<\/p>\n<p>Advanced network monitoring can detect suspicious activity, but that requires a significant amount of time and IT expertise. Small- and medium-sized businesses usually don\u2019t have the resources to handle 24&#215;7 network supervision, but our team can help.<\/p>\n<p>If you need help securing your business and its information from cyber threats, give us a call today.<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2017\/10\/who-are-the-shadowbrokers\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It\u2019s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers? [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68],"tags":[1159,52,1160,1161,444,1162,264,1163],"class_list":["post-1243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows","tag-2017october4windows_a","tag-cybersecurity","tag-eternalblue","tag-national-security-agency","tag-ransomware","tag-shadowbrokers","tag-windows","tag-zero-day-exploits"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Who are the ShadowBrokers?<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who are the ShadowBrokers?\" \/>\n<meta property=\"og:description\" content=\"The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It\u2019s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers? [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-06T12:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:42:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Who are the ShadowBrokers?\",\"datePublished\":\"2017-10-06T12:00:57+00:00\",\"dateModified\":\"2022-03-02T13:42:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/\"},\"wordCount\":433,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg\",\"keywords\":[\"2017october4windows_a\",\"cybersecurity\",\"eternalblue\",\"national security agency\",\"ransomware\",\"shadowbrokers\",\"windows\",\"zero day exploits\"],\"articleSection\":[\"Windows\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/\",\"name\":\"Who are the ShadowBrokers?\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg\",\"datePublished\":\"2017-10-06T12:00:57+00:00\",\"dateModified\":\"2022-03-02T13:42:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who are the ShadowBrokers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Who are the ShadowBrokers?","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Who are the ShadowBrokers?","og_description":"The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It\u2019s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers? [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2017-10-06T12:00:57+00:00","article_modified_time":"2022-03-02T13:42:08+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Who are the ShadowBrokers?","datePublished":"2017-10-06T12:00:57+00:00","dateModified":"2022-03-02T13:42:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/"},"wordCount":433,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg","keywords":["2017october4windows_a","cybersecurity","eternalblue","national security agency","ransomware","shadowbrokers","windows","zero day exploits"],"articleSection":["Windows"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/","name":"Who are the ShadowBrokers?","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg","datePublished":"2017-10-06T12:00:57+00:00","dateModified":"2022-03-02T13:42:08+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017October4Windows_A_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/who-are-the-shadowbrokers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Who are the ShadowBrokers?"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1243"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1243"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1243\/revisions"}],"predecessor-version":[{"id":4138,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1243\/revisions\/4138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}