Skip to main content

NSA Hacked along with its Hacking tools


National Security Agency is the intelligence agency of America which was in news after the Revelation from Edward Snowden. Last year a hacking group called equation group was linked with many hacking and spying incident.Equation Group is also linked with a cyber weapon called Stuxnet. Equation group is no doubt  having closest links to NSA and last week NSA was hacked by a hacking group called Shadow Broker.This hacking group was able to hack NSA and has also Dumped all their tools.You shall be amazed that how Shadow Broker Leaked all these tools and message online without leaving  any trace behind.Group uploaded their whole meassage on Pastbin. Now the Message is deleted from pastebin. But Before being deleted we dumped the whole message from Pastebin. You can see and read whole message below:-


"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

From:

bitmessage = BM-NBvAHfp5Y6wBykgbirVLndZtEFCYGht8
i2p-bote =  o1uHOkOcMoFEa7O7dbEilzfMvWzo7bDu~td3x9gYz4b4t5OriJ7U6GUWr5GZoWxQ9f2TrIY5RzhpIMVP6hTLXZ


Equation Group Cyber Weapons Auction - Invitation
- ------------------------------------------------

!!! Attention government sponsors of cyber warfare and those who profit from it !!!!

How much you pay for enemies cyber weapons? Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.

Picture Urls
- ------------
http://imgur.com/a/sYpyn
https://theshadowbrokers.tumblr.com/
https://github.com/theshadowbrokers/EQGRP-AUCTION

File Urls
- ----------

magnet:?xt=urn:btih:40a5f1514514fb67943f137f7fde0a7b5e991f76&tr=http://diftracker.i2p/announce.php

https://mega.nz/#!zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU
https://app.box.com/s/amgkpu1d9ttijyeyw2m4lso3egb4sola
https://www.dropbox.com/s/g8kvfl4xtj2vr24/EQGRP-Auction-Files.zip
https://ln.sync.com/dl/5bd1916d0#eet5ufvg-tjijei4j-vtadjk6b-imyg2qkd
https://yadi.sk/d/QY6smCgTtoNz6


Free Files (Proof)
- ------------------
eqgrp-free-file.tar.xz.gpg

sha256sum = b5961eee7cb3eca209b92436ed7bdd74e025bf615b90c408829156d128c7a169

gpg --decrypt --output eqgrp-free-file.tar.xz eqgrp-free-file.tar.xz.gpg

Password = theequationgroup


Auction Files
- -------------
eqgrp_auction_file.tar.xz.asc

sha256sum = af1dabd8eceec79409742cc9d9a20b9651058bbb8d2ce60a0edcfa568d91dbea

Password = ????

Auction Instructions
- --------------------
We auction best files to highest bidder. Auction files better than stuxnet. Auction files better than free files we already give you. The party which sends most bitcoins to address: 19BY2XCgbDe6WtTVbTyzM9eR3LYr6VitWK before bidding stops is winner, we tell how to decrypt. Very important!!! When you send bitcoin you add additional output to transaction. You add OP_Return output. In Op_Return output you put your (bidder) contact info. We suggest use bitmessage or I2P-bote email address. No other information will be disclosed by us publicly. Do not believe unsigned messages. We will contact winner with decryption instructions. Winner can do with files as they please, we not release files to public.


FAQ
- ---
Q: Why I want auction files, why send bitcoin? A: If you like free files (proof), you send bitcoin. If you want know your networks hacked, you send bitcoin. If you want hack networks as like equation group, you send bitcoin. If you want reverse, write many words, make big name for self, get many customers, you send bitcoin. If want to know what we take, you send bitcoin.

Q: What is in auction files? A: Is secret. Equation Group not know what lost. We want Equation Group to bid so we keep secret. You bid against Equation Group, win and find out or bid pump price up, piss them off, everyone wins.

Q: What if bid and no win, get bitcoins back? A: Sorry lose bidding war lose bitcoin and files. Lose Lose. Bid to win! But maybe not total loss. Instead to losers we give consolation prize. If our auction raises 1,000,000 (million) btc total, then we dump more Equation Group files, same quality, unencrypted, for free, to everyone. 

Q: When does auction end? A: Unknown. When we feel is time to end. Keep bidding until we announce winner.

Q: Why I trust you? A: No trust, risk. You like reward, you take risk, maybe win, maybe not, no guarantees. There could be hack, steal, jail, dead, or war tomorrow. You worry more, protect self from other bidders, trolls, and haters.


Closing Remarks
- --------------------------------------------------

!!! Attention Wealthy Elites !!!

We have final message for "Wealthy Elites". We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what "Equation Group" can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? "Do you feel in charge?" Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?


bitmessage = BM-NBvAHfp5Y6wBykgbirVLndZtEFCYGht8
i2p-bote =  o1uHOkOcMoFEa7O7dbEilzfMvWzo7bDu~td3x9gYz4b4t5OriJ7U6GUWr5GZoWxQ9f2TrIY5RzhpIMVP6hTLXZ

END MESSAGE

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=5yni
-----END PGP SIGNATURE-----"


This is the whole message that they posted online on Pastebin.They Posted the links to download the tools from their links.If all the links are Deleted than you can contact us we can provide all those dumps.In Dump they also gived some free tools for the genuineness of tools.Group also posted the method to decrypt the whole free files. Message also contain Password to decrypt free files.Now their is another file available which is paid. If You Want to decrypt that file than  you have to take part in their auction which starts from 5 Million Bitcoin and 5 Million Bitcion Approx which will  equals to 196847020125 INR. Bitcion address of hacking group is also posted address for bitcoin transfer.If you are thinking that the tools are legit or fake.Edward Snowden Verified it by Posting On Twitter that "The hack of an NSA malware staging server is not unprecedented, but the publication of the take is. Here's what you need to know: (1/x)."

If you like this article then like,share and also subsribe to us .

Don't Forget to like our Facebook Page.

Comments

  1. Team camaraderie from years past is a fond memory for many. Being young is a better memory. After many years of slaving away in the business world and earning decent income has many looking to mid-January for the chance to escape the cold weather as well as escape middle age. Baseball fantasy camp offers a chance to don a real uniform -name and all - of one's favorite team, be guided by the real team coaches and players and to once again, take a place on the field.
    pre hacked games

    ReplyDelete

Post a Comment

Popular posts from this blog

How to hack Andriod using Stagefright Vulnerability

Today i am going to demonstrate a exploit to take reverse shell in android,before i explain the demo i want to explain some things related to  this hack or exploit and also this for education and awareness about security of your devices.
What is Stagefright?
Android includes Stagefright, a media playback engine at the native level that has built-in software-based codecs for popular media formats.

Stagefright audio and video playback features include integration with OpenMAX codecs, session management, time-synchronized rendering, transport control, and DRM.

Stagefright also supports integration with custom hardware codecs provided by you. To set a hardware path to encode 
and decode media, you must implement a hardware-based codec as an OpenMax IL (Integration Layer) component.  

How hacker can exploit this Stagefright Library?
This critical vulnerability was discovered by a researcher at Cyber Security Firm called Zimperium. This  vulnerability is a type of buffer overflow attack and in thi…

The Best way to Track your Facebook Login Location and Receive the Login Alerts

I think about One-Fourth of the total world population is on Facebook and Whatsapp. Facebook hacking has become common so we all should look towards our safety so that no one else could use our account for something doing illegal purposes and we should know that when our account was last logged in and from which location.

By the Way Facebook provides both the Features for your Safety and has a lot of many Additional Features.When someone or you log in into your account, facebook notify you by sending you a message at your Registered Phone Number and your registered Email-ID.It also has a feature that you can see at which place you were last logged in.

Follow the Below Steps to Track your Facebook Login Location ::

1)First of all open up a browser and log in into your Facebook account.
2)At the Right most End below the Address Bar there will be a Down Arrow.Click on that arrow.
3)Now click on the Settings Option.Then Click on Security below the General option.
4)Now click on the Edit button …

How to Transfer Your Android SmartPhone to PC from Wifi Wirelessly The Best Way

Everybody in today's World is on Internet and they have become very Modern and Work Smartly in their life and make full use of the Internet to do their work more efficiently and Simply.
If you have a Android Smart Phone,What would you do if you want to see your mobile stuff on your Windows ?Buy a Card Reader or use a Data Cable or use Shareit or something like that to transfer your Data to your Windows and Then Access it.
I got a Better and Of course a Smart Way to do this with a help of a Simple app called Airdroid.And I bet you that It will the Best Android App you have ever seen.

Follow the Below Steps to Transfer your Android Phone to PC ::

1)Download the Airdroid App from PlayStore and install it.
2)Open the App and first Sign Up.You can Sign up using Google+,Facebook or Twitter also.
3)A small Window will appear asking for View all App and System Notifications on the Computer in real time.Click on the Enable Button.
4)Then your Mobile Accessibility Settings will be open.Under the S…