First Hand Details: TEG (The Equation Group) is NSA's team of hackers who'd write code to exploit systems worldwide. Some of the private files were recently dropped by a group called Shadow Brokers & they've auctioned it in exchange for BTC bids .. I could trail back to the below mentioned keys which were earlier released previous week by Snowden (if anyhow it's linked {it's just sitting here for references}):
Probable Agenda: As taken inputs from @atdre answer to explain the agenda - there are different versions of the primary agenda as below:
http://www.businessinsider.in/A-shadowy-group-claims-to-have-hacked-an-elite-hacking-group-linked-to-the-NSA/articleshow/53712768.cms
Sources:
- Wikileaks Intention to release the same files
- RT's version of Cyber Weapon Disclosures
- Sputnik's version of Malware Scandal by NSA
- Analysis suggests revisions of malware & resemblance to older versions
- Shadowbrokers Tainted Bitcoin Transactions, US Involved!? A Question.
- Shadowbrokers drops IP Ranges NSA Targeted
- Shadowbrokers exits the scene
- ShadowBrokers Exploit(s) Released
Official Sources Timeline:
- The first official after Wikileaks probability of intent to disclose the same set of files, Edward Snowden comes up with a teensy bit of a diplomatic pressure statement. Thanks to @WhiteWinterWolf to report this one out.
Some Analysis of the released files Reported:
- Analysis by Risk Based Security over The Equation's Group Files
- Analysis by Matt Suiche, MVP - Microsoft via Medium
- BENIGNCERTAIN Analysis confirmed by The Intercept
Solved Proof Of Concept & it's Working State:
- XORCat's EXBE (ExtraBacon) POC from TEG file: The exploits appear to be targeting firewalls, particularly Cisco PIX/ASA, Juniper Netscreen, Fortigate, and more as per analyst.
Questions: The Equation Group were hacked (NSA) & it's a wonder if they aren't backdoor!? Of-course we go through the code .. but could anyone let us know if these files are genuine?
Also, what's the use of the files, what they specifically target? These files landed originally at:
https://theshadowbrokers.tumblr.com
Now they are gone, the links they've provided are gone (except one which's here) & the original copies might have been already backdoored (later ones which might pop up). I read it's related to Stuxnet (or more powerful, I know that Stuxnet targeted Nuclear Facilities) but now that they are gone .. can anyone let know the real intent of the files & the groups they've mentioned as inline:
What does each of the section specifically does? All inputs are appreciated & links to this one to be updated one by one as the reason becomes clear.
EDIT: As of Apr, 2017 - Shadown Brokers have released the exploit packages, here are some samples which are on the release:
Exploits
EARLYSHOVEL
RedHat 7.0 - 7.1 Sendmail 8.11.x exploit
EBBISLAND (EBBSHAVE)
root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86.
ECHOWRECKER
remote Samba 3.0.x Linux exploit.
EASYBEE
appears to be an MDaemon email server vulnerability
EASYPI
is an IBM Lotus Notes exploit that gets detected as Stuxnet
EWOKFRENZY
is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2
EXPLODINGCAN
is an IIS 6.0 exploit that creates a remote backdoor
ETERNALROMANCE
is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010)
EDUCATEDSCHOLAR
is a SMB exploit (MS09-050)
EMERALDTHREAD
is a SMB exploit for Windows XP and Server 2003 (MS10-061)
EMPHASISMINE
is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2
ENGLISHMANSDENTIST
sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other users
EPICHERO
0-day exploit (RCE) for Avaya Call Server
ERRATICGOPHER
is a SMBv1 exploit targeting Windows XP and Server 2003
ETERNALSYNERGY
is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)
ETERNALBLUE
is a SMBv2 exploit for Windows 7 SP1 (MS17-010)
ETERNALCHAMPION
is a SMBv1 exploit
ESKIMOROLL
is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers
ESTEEMAUDIT
is an RDP exploit and backdoor for Windows Server 2003
ECLIPSEDWING
is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)
ETRE
is an exploit for IMail 8.10 to 8.22
FUZZBUNCH is an exploit framework, similar to MetaSploit
ODDJOB
is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors
Utilities
PASSFREELY
utility which "Bypasses authentication for Oracle servers"
SMBTOUCH
check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCE
ERRATICGOPHERTOUCH
Check if the target is running some RPC
IISTOUCH
check if the running IIS version is vulnerable
RPCOUTCH
get info about windows via RPC
DOPU
used to connect to machines exploited by ETERNALCHAMPIONS
GitHub Reference: https://github.com/misterch0c/shadowbroker