On Monday, a hacking\u0026nbsp;group calling\u0026nbsp;itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA.\u0026nbsp;Based on never-before-published\u0026nbsp;documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal\u0026nbsp;contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.The provenance of the code\u0026nbsp;has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear\u0026nbsp;how the software leaked, one thing is now beyond speculation: The malware is covered with\u0026nbsp;the NSA’s virtual fingerprints and clearly originates from the agency.The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual\u0026nbsp;instructs NSA operators to track their use of one\u0026nbsp;malware program using\u0026nbsp;a specific 16-character string, “ace02468bdf13579.”\u0026nbsp;That exact same string appears throughout the ShadowBrokers leak in code\u0026nbsp;associated with\u0026nbsp;the same program, SECONDDATE.SECONDDATE plays a specialized\u0026nbsp;role inside a complex global system built by the\u0026nbsp;U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse\u0026nbsp;at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told\u0026nbsp;The Intercept:The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable.So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or\u0026nbsp;its malware.Read the full article at The Intercept.