Equation Group leaks While the exact date is unclear, reports suggested that the preparation of the
leak started at least in the beginning of August, and that the initial publication occurred August 13, 2016 with a Tweet from a
Twitter account "@shadowbrokerss" announcing a
Pastebin page On October 31, 2016, The Shadow Brokers published a list of servers supposedly compromised by the Equation Group, as well as references to seven supposedly undisclosed tools (DEWDROP, INCISION, JACKLADDER, ORANGUTAN, PATCHICILLIN, RETICULUM, SIDETRACK AND STOICSURGEON) also used by the threat actor. On April 8, 2017, the
Medium account used by The Shadow Brokers posted a new update. The post revealed the password CrDj”(;Va.*NdlnzB9M?@K2)#>deB7mN to encrypted files released the previous year, which allegedly had more
NSA hacking tools. This posting explicitly stated that the post was partially in response to President Trump's
attack against a Syrian airfield, which was also used by
Russian forces.
April 14 hacking tool leak On April 14, 2017, The Shadow Brokers released, amongst other things, the tools and exploits codenamed: DANDERSPRITZ, ODDJOB, FUZZBUNCH, DARKPULSAR, ETERNALSYNERGY, ETERNALROMANCE,
ETERNALBLUE, EXPLODINGCAN and EWOKFRENZY. The leak was suggested to be the "most damaging release yet" and
CNN quoted Matthew Hickey saying, "This is quite possibly the most damaging thing I've seen in the last several years". Some of the exploits targeting the
Microsoft Windows operating system had been patched in a Microsoft Security Bulletin on March 14, 2017, a month before the leak occurred. Some speculated that
Microsoft may have been tipped off by the
NSA about the release of the exploits.
EternalBlue Over 200,000 systems were infected with tools from this leak within the first two weeks, and in May 2017, the major
WannaCry ransomware attack used the ETERNALBLUE exploit on
Server Message Block (SMB) to spread itself. The exploit was also used to help carry out the
2017 NotPetya cyberattack on June 27, 2017. ETERNALBLUE contains kernel shellcode to load the non-persistent
DoublePulsar backdoor. This allows for the installation of the PEDDLECHEAP payload which would then be accessed by the attacker using the DanderSpritz Listening Post (LP) software. ==Speculations and theories on motive and identity==