Effort to Crowdfund Access to NSA Leaks Withdrawn over Legal Issues

A bid by researchers to crowdfund access to a leak-of-the-month club from the group that leaked the tool used in the Wanna Cry ransomware has been rejected due to legal issues, The Hill reports.

The ShadowBrokers, who have been leaking hacking tools apparently stolen from the National Security Agency (NSA) since last year, have released intelligence agency-quality source code to bypass popular security hardware, files indicating that the NSA used an interbank communications network to hack Middle-Eastern financial institutions and a suite of tools to penetrate and implant malware on Windows.

The hacker group recently announced a “Wine of the month club” type subscription leaks service for the remainder of their files, and the original intent of the crowdfunded “Shadowbrokers Response Team” was to purchase access to the leaks and allow security researchers to tear through the files. The team would notify software and hardware manufacturers about any vulnerabilities the ShadowBrokers released in their systems.

“If you ever want to hear a lawyer shout expletives over the phone, you need to call him and tell him that you have created the first open source, crowd-funded cyber arms acquisition attempt,” tweeted Response Team co-founder Matthew Hickey.

In its day and a half on the Paetron crowdfunding website, the initiative received $3,096 in donations from 40 donors – more than 10 percent of the $23,000 monthly fee. In an interview with The Hill on Wednesday, Hickey said he was excited about the prospects of running the service.

“At the end of the day, we are reducing the value of the tools. If we could spend [$23,000] to prevent the next Wanna Cry, I think it’s worth it”, said Hickey, who also co-founded the cybersecurity company My Hacker House.

Wanna Cry infected hundreds of thousands of computers worldwide, interfering with organizations worldwide including hospitals in Great Britain and the Russian government. The outbreak could have been much worse save for a series of coding mistakes, including a poorly conceived system of figuring out if security software was testing the legitimacy of the ransomware and bugs preventing WannaCry from executing properly on Windows XP systems.

Be the first to comment

Leave a Reply

Your email address will not be published.


*