Hackers behind stolen NSA tool for WannaCry: More leaks coming


Shadow Brokers, the hacking group behind the release of the WannaCry malware, has announced that it will be releasing more of its stolen data on a monthly basis.

"Is being like wine of month club", they wrote in broken English.

The hacking group dubbed its new monthly subscription model "TheShadowBrokers Data Dump of the Month;" the service kicks off in June.

The infamous Shadow Brokers hacking crew, central players in the release of the vulnerability that led to last week's WannaCrypt chaos, have returned online with a threat to release more exploits.

While the EternalBlue exploit did not affect Windows 10, the group said "newer exploits for Windows 10" could be provided, as well as "compromised network data" from worldwide financial systems and foreign nuclear and missile programmes.

Shadowbrokers are also claiming that they have very important information of nuclear and missile program of the countries like Russia, China, Iran and North Korea.

South Korea orders recalls for Hyundai, Kia after whistleblower report
Hyundai has appealed the decision saying the defects do not pose serious threats to passenger safety to require a forced recall. This is the first time ever that the transport ministry has ordered a compulsory recall of Hyundai and Kia vehicles.

At least not until the Shadow Brokers released screenshots of the Equation Group's stolen "2013 Windows Ops Disk". While later reports have questioned how much of a role the Shadow Brokers actually had in the leak of the exploits, what is known without a doubt is that the exploits in their possession did indeed originate from the NSA, as confirmed by the Snowden documents.

The group had also previously put exploits up for sale on ZeroNet for up to 250 bitcoins a piece ($454,815 today) in January, Motherboard reported. At the end of the letter, the hacker group hinted the NSA could make all these problems go away if the agency paid up for the tools. It references its posting of screenshots of Windows exploits from its haul, a development it credits for Microsoft's release of an SMB (Server Message Block) patch in March, before attempting to justify its release of tools a month later in April, warning there was a lot more where that came from. To tease bidders, the group dumped a collection of files containing mostly firewall exploits.

In fact, the only thing we really know about the group's choice of clientele is their frustration that no tech companies or national governments were willing to pay the ransom.

On the other hand, instead of telling them to Microsoft to patch up those vulnerabilities, it could bring forth a tumultuous situation as far as online security is concerned. That holding back of exploits, in theory, is the reason why Microsoft's Chief Legal Officer Brad Smith was so mad about WannaCry and the United States government stockpiling vulnerabilities.

In the blog post, Shadow Brokers mention that they're taking a stern approach towards fighting the cybersecurity practices across the globe - and they think leaking sensitive data is the best option to do so.