(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Not long ago, a group referring to itself as the Shadow Brokers distributed hacking tools utilized by the United States National Security Agency (NSA), on various publically-accessible websites. While the motives of the Shadow Brokers are a story for another time, an investigation seems to have locked in on a particular theory of how the Shadow Brokers came into possession of the tools in the first place.

Hypotheses were initially varied as to how the tools were taken from the NSA at all. Some surmised that the leak must have been the work of another agency insider following the lead of the controversial Edward Snowden. Some suspected that Russia, deemed responsible by D.C. lawmakers, had hacked into the NSA headquarters located in Fort Meade.

However, the FBI has begun to focus their efforts on an entirely different source, one that--while certainly less openly malicious than a foreign attack or insider leak--still shows the dangers that human error can present to cyber security.

Based on information provided by the NSA, investigators are looking into reports that an individual associated with the agency, either as an employee or a contractor, had left the tools on a remote computer during an operation approximately three years ago. These tools would allow their users to exploit systems from Fortinet Inc. and Cisco Systems.

Patches have since been released to help protect these systems from the now-public tools. Investigators, however, are not ruling out the possibility that the tools were left exposed on purpose, or that others within the NSA made similar mistakes that ultimately resulted in the Shadow Brokers obtaining them.

To their credit (assuming that it was an honest mistake), the unnamed individual reported their mistake shortly afterwards, according to the NSA--which, it must be mentioned, did not inform the companies of the risk to their systems. Rather, having sought out foreign use of the tools with no results, the NSA saw no need to inform the software manufacturers.

Regardless of blame for the release of these tools into the public domain, the unnamed former NSA representative who left the tools on the remote computer proves that critical data should never leave the safety measures to be found on-premises and taken into the world without considerable measures put in place to ensure its security.

For advisement and assistance in putting measures in place to protect your business from theft, call Carceron at (770) 424-3393.


No comments yet
Already Registered? Login Here
Wednesday, 26 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Tip of the Week Internet Microsoft Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Small Business Hardware Data Productivity Hackers Gadgets Mobile Office Business Computing Business Email Malware Hosted Solutions Google IT Services Quick Tips Social Media IT Support Virtualization Mobile Devices Upgrade Business Continuity Smartphones Passwords Users Disaster Recovery Microsoft Office Network Windows VoIP WiFi Server User Tips Miscellaneous Innovation Mobile Device Management Windows 10 Computer Vendor Management Smartphone Efficiency Mobile Computing Communication Remote Computing BYOD Unified Threat Management Operating System Marketing Apps The Internet of Things Holiday History Bring Your Own Device Health IT Consultant Android Facebook Analytics Ransomware Windows 8 Apple Alert Going Green Wireless Technology Lithium-ion Battery Outlook Big data Office Printer Content Filtering Information Technology Saving Time Tech Support Hard Drives Network Security Save Money Firewall Phishing Employer-Employee Relationship Gmail Collaboration Remote Monitoring Spam Hiring/Firing Data Management Bandwidth Search Antivirus Browser Humor Smart Phones Computer Repair Save Time Maintenance Tutorials Proactive IT App Best Practice Automation Computers Internet of Things Hacking User Error PowerPoint User Black Market Help Desk Sports Avoiding Downtime Router Virus Intranet Business Intelligence Education Administration iPhone Hacker Budget Managed IT services Document Management Excel Money Phone System Two-factor Authentication Wireless Current Events Running Cable Website Fax Server Mobile Device Network Congestion BDR SaaS Experience Heating/Cooling Digital Payment Customer Relationship Management Social Networking Bluetooth Laptop Telephone Systems Computer Accessories Comparison Compliance Office 365 Augmented Reality Inbound Marketing Business Growth Company Culture Encryption Safety Social Cost Management Text Messaging VPN Downtime Networking Comanaged IT Customer Service Government USB Managed IT Recovery Programming End of Support Cybercrime Password Pain Points Artificial Intelligence Law Enforcement Printer Server Chrome Twitter Outsourced IT Cortana Legal Gaming Console Risk Management Data storage Presentation IBM Processors communications Documents Flexibility Thin Client Statistics Office Tips Retail Streaming Media Computing Net Neutrality Virtual Desktop Hosted Solution Robot CIO Domains Business Owner eWaste File Sharing Memory Touchscreen Co-Managed IT Wi-Fi Music Upgrades Specifications Environment Flash Harddrive Adminstration Competition Analytic Deep Learning LinkedIn Entertainment Wearable Technology Riske Management Settings LiFi Application Digital Signature Banking Mouse Operating Systerm Monitors Language Visible Light Communication Business Metrics Google Wallet Displays DDoS Display Ebay Advertising Drones Chromebook Tablet External Harddrive Efeciency YouTube Word Content Management Work/Life Balance Pirating Information Public Speaking HIPAA Recycling Skype Electronic Payment Writing organize Entrepreneur Archive Teamwork Unified Communications Webinar Staffing Update Download switches Best Available Paperless Office Video Surveillance Permissions Trending Google Docs Disaster IP Address Online currency Storage Microchip Point of Sale Read Regulations Human Resources Keyboard Value Identity Theft GPS Debate Solid State Drive Securty Hacks PDF IT consulting Microserver Shortcut Adroid Virtual Reality 3D Lifestyle Society Micrsooft Leadership Troubleshooting Notifications IT service Windows XP Turn Key Computing Infrastructure

Mobile? Grab this Article!


Recent Comments

Ryder Frith Milla Minchin Use Your Smartphone Incorrectly and Risk Going Temporarily Blind
24 October 2016
Wonderful post and you share excellent content in this post i am happy to comment on this Online Fa...

Blog Archive