Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Should the NSA Reveal Leaked Exploits?

    Written by

    Robert Lemos
    Published August 27, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      On Aug. 13, a group known as the “Shadow Brokers” announced on Twitter that they would auction off a set of cyber-espionage tools taken from the server of the Equation Group, widely considered part of the United States’ intelligence services and likely to be operating as part of the National Security Agency.

      The announcement was met first with disbelief, then chagrin, as it became apparent that the compromise and post-exploitation framework were genuine. Questions remain, James Clapper, director of national intelligence, said at an Aug. 24 event. “It’s still under investigation,” he said, according to the Associated Press. “We don’t know exactly the full extent—or the understanding—of exactly what happened.”

      What is known is that the leak involved an encrypted set of files weighing in at more than 250MB of data, and which included the encryption key for a folder of teaser files labeled “Firewall.” The key to unlock the encrypted main body of data will only be released, the group said, if they receive 1 million bitcoin, about $580 million. The Shadow Brokers are thought to be linked to Russia.

      While the NSA is most known for its offensive capabilities—it’s ability to spy on other nation’s and group’s communications—the leak of a significant collection of vulnerabilities known to only a few should signal that the agency should be considering its defensive role more heavily, according to security experts.

      “If there is an attributable group in a foreign country that is going to use this against people, it is in everyone’s interest for the [government behind the Equation Group] to notify the vendors so that other nations are not using Equation’s IP against citizens,” Logan Brown, president of threat intelligence and vulnerability acquisition firm Exodus Intelligence, told eWEEK.

      The outing of the NSA-linked framework is the latest in a series of leaks of cyber toolsets that highlight that many governments are active in cyber operations against rival nations, non-governmental groups and even individuals. Mobile security firm Lookout and the University of Toronto’s Citizen Lab revealed on Aug. 25, for example, that an attacker, likely a nation, had used espionage tools allegedly created by the NSO Group—including exploits for three previously unknown iOS vulnerabilities—against a well-known Middle Eastern activist, Ahmed Mansoor. Mansoor had been targeted by similar attempts twice before.

      With each revelation, questions about the appropriate use of such technology—and whether citizens are better served by government agencies that help harden computer systems or conduct espionage on others’ systems—grow louder. The code in the leaked “Firewall” files included the names of tools, such as “SecondDate” and a specific passcode that marks the data as a match for the information leaked by former NSA contractor Edward Snowden. As the name indicates, the attack tools in the teaser data target vulnerabilities in major firewalls. Cisco is in the process of patching one issue, but noted that another vulnerability targeted by the Equation Group tools had been patched in 2011. Fortinet examined the files and found the attacks only affected versions of its software prior to 2012. And Juniper has not found any exploitable vulnerabilities in the data.

      Should the NSA Reveal Leaked Exploits?

      The leak changes the equation for what constitutes an equitable arrangement between the NSA’s desire to have exploitation capabilities and its mission to protect U.S. computer systems and communications, stated Nicholas Weaver, senior staff researcher at the International Computer Science Institute in Berkeley, Calif.

      “Previously, equities calculations generally relied on the probability that someone else might independently discover and exploit a vulnerability,” he said in a post to the Lawfare blog. “How does this calculation change when the NSA’s own tools might be stolen, without detection? Is there a policy on what to do when the NSA knows that their tools are compromised?”

      If the NSA knew that the information had been lost, it should have notified the vendors, he said.

      “If the NSA knew of the breach of their tools and failed to notify Cisco and Fortinet, this would represent a serious dereliction of the NSA’s Information Assurance mission because both of those products are used by the government and on DOD systems which IAD is charged with protecting,” Weaver said.

      In the past, the U.S. government has stated that it would disclose vulnerabilities when there is a clear need to protect the Internet and the nation’s computer systems. Following the disclosure of a widespread flaw in OpenSSL known as Heartbleed, the White House stressed that it did not know about the issue, and if it had, it would have notified the public.

      Yet Michael Daniel, special assistant to the president and cyber-security coordinator, who penned the statement, argued that the decision is not always easy.

      “[T]here are legitimate pros and cons to the decision to disclose, and the trade-offs between prompt disclosure and withholding knowledge of some vulnerabilities for a limited time can have significant consequences,” he said. “Disclosing a vulnerability can mean that we forgo an opportunity to collect crucial intelligence that could thwart a terrorist attack, stop the theft of our nation’s intellectual property, or even discover more dangerous vulnerabilities that are being used by hackers or other adversaries to exploit our networks.”

      For the most part, companies have remained mum on the issue. Cisco, Juniper and Fortinet declined to comment for this article, and their spokespeople pointed to already published statements on their patches for the vulnerabilities.

      The NSA also did not return requests for comment. However, Exodus Intelligence’s Brown said that, ultimately, the choice to disclose the issues may not lie with the spy agency. If the Equation Group is a private firm, which counts the NSA as a client, then the intellectual property—and decisions about that IP—belong to the private firm, Brown said.

      In that case, “it’s not the government’s IP, it is the Equation Group’s IP,” Brown said.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.