Skip to main content

Common Dreams. Journalism funded by people, not corporations.

There has never been—and never will be—an advertisement on our site except for this one: without readers like you supporting our work, we wouldn't exist.

No corporate influence. No pay-wall. Independent news and opinion 365 days a year that is freely available to all and funded by those who support our mission: To inform. To inspire. To ignite change for the common good.

Our mission is clear. Our model is simple. If you can, please support our Fall Campaign today.

Support Our Work -- No corporate influence. No pay-wall. Independent news funded by those who support our mission: To inform. To inspire. To ignite change for the common good. Please support our Fall Campaign today.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public.  (Photo: Ulrich Baumgarten/Getty Images)

The NSA Was Hacked, Snowden Documents Confirm

A top-secret NSA guide, provided by whistleblower Edward Snowden and previously unpublished, confirms that hackers have in fact breached a computer system controlled by the NSA

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:

The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable.

So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.

The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or its malware.

Read the full article at The Intercept.


© 2021 The Intercept

This is the world we live in. This is the world we cover.

Because of people like you, another world is possible. There are many battles to be won, but we will battle them together—all of us. Common Dreams is not your normal news site. We don't survive on clicks. We don't want advertising dollars. We want the world to be a better place. But we can't do it alone. It doesn't work that way. We need you. If you can help today—because every gift of every size matters—please do. Without Your Support We Simply Don't Exist.

Wyden's New Billionaires Income Tax Plan Applauded as Step Toward Justice

"For too long, families have been denied basic supports... while billionaires evade taxes on obscene amounts of wealth. This dynamic is economically dangerous and morally unsustainable."

Jessica Corbett ·


'Tax Them All': Warren, Wyden Lead Push for Minimum Corporate Tax in Build Back Better Act

"Giant corporations have been exploiting tax loopholes for too long, and it's about time they pay their fair share to help run this country, just like everyone else," said Sen. Elizabeth Warren.

Julia Conley ·


Brazil Senate Panel Backs Indictment of Bolsonaro for 'Terrifying' Covid-19 Crimes

"It is evident that the president of the republic is the main culprit for most of the more than 600,000 deaths."

Brett Wilkins ·



'Not Just Immoral, Deadly': How Corporate Lobbyists Ramped Up Spending Ahead of COP26

"The fossil fuel lobby's grimy fingerprints are all over yet another congressional deadlock on meaningful climate action," warned one campaigner.

Jon Queally ·

Support our work.

We are independent, non-profit, advertising-free and 100% reader supported.

Subscribe to our newsletter.

Quality journalism. Progressive values.
Direct to your inbox.

Subscribe to our Newsletter.


Common Dreams, Inc. Founded 1997. Registered 501(c3) Non-Profit | Privacy Policy
Common Dreams Logo