Microsoft responds to latest Shadow Brokers zero-day exploits leak

Posted April 16, 2017

North Korea is suspected of using SWIFT to target the Union Bank of India in an attempt to steal $170 million in July 2015, similar to the cyberheist of $81 million against the Blangladesh Bank.

"The threat is very persistent, adaptive and sophisticated - and it is here to stay", SWIFT said in the November letter to client banks, seen by Reuters.

The SWIFT messaging system, which is headquartered in Belgium, is used by banks to transfer trillions of dollars each day.

"SWIFT is aware of allegations surrounding the unauthorized access to data at two service bureaus", a spokesperson for the group told The Reg.

Beaumont said there was bad news in the release for Microsoft as well.

In response, Swift has said there is no evidence that the main Swift network had ever been accessed without authorisation.

"This would make a lot of sense that the NSA compromise this specific SWIFT Service Bureau for Anti-money laundering (AML) reasons in order to retrieve ties with terrorists groups", Suiche wrote.

A new set of documents purportedly lifted from the U.S. National Security Agency suggests that American spies have burrowed deep into the Middle East's financial network, apparently compromising the Dubai office of the anti-money laundering and financial services firm EastNets. In a message sent to TechCrunch overnight, the company said it has addressed the issue for systems running Windows 7 and later.

Bombardment in Iraq's Mosul takes heavy toll on civilians
Col Dorrian said the fight in Western Mosul had been tough but said Islamic State fighters had no escape. Rasool also added that more than 50 percent of the western side of Mosul has been liberated from ISIS.

This entire saga all started Friday after a hacker group known as the Shadow Brokers released tools created to target Windows PCs and servers, along with presentations and files purporting to detail the agency's methods of carrying out clandestine surveillance. No, they're not. Shadow Brokers said in a blog post that this leak won't be their last, saying "Maybe if all suviving WWIII theshadowbrokers be seeing you next week". He said he concluded that the NSA took advantage and got in that way. One collection of 15 exploits contains at least four Windows hacks that researches have already been able to replicate.

Since the early 1990s, interrupting the flow of money from Saudi Arabia, the United Arab Emirates and elsewhere to al-Qaida, the Taliban and other militant Islamic groups in Afghanistan, Pakistan and other countries has been a major objective of US and allied intelligence agencies.

The documents published by the hacking group list exploits for Windows servers and Windows computers. EastNets has, however, denied that its servers were hacked.

"While we cannot ascertain the information that has been published, we can confirm that no EastNets customer data has been compromised in any way", said Hazem Mulhim, CEO of EastNets in a statement.

"This is not a drill", former NSA contractor Edward Snowden tweeted Friday.

He said other documents in the release suggested an even wider effort to monitor the world's transactions.

The Shadow Brokers has been posting hacking tools to the GitHub repository in an online auction over the a year ago, according to Wikipedia's account.