ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Not long ago, a group referring to itself as the Shadow Brokers distributed hacking tools utilized by the United States National Security Agency (NSA), on various publically-accessible websites. While the motives of the Shadow Brokers are a story for another time, an investigation seems to have locked in on a particular theory of how the Shadow Brokers came into possession of the tools in the first place.

Hypotheses were initially varied as to how the tools were taken from the NSA at all. Some surmised that the leak must have been the work of another agency insider following the lead of the controversial Edward Snowden. Some suspected that Russia, deemed responsible by D.C. lawmakers, had hacked into the NSA headquarters located in Fort Meade.

However, the FBI has begun to focus their efforts on an entirely different source, one that--while certainly less openly malicious than a foreign attack or insider leak--still shows the dangers that human error can present to cyber security.

Based on information provided by the NSA, investigators are looking into reports that an individual associated with the agency, either as an employee or a contractor, had left the tools on a remote computer during an operation approximately three years ago. These tools would allow their users to exploit systems from Fortinet Inc. and Cisco Systems.

Patches have since been released to help protect these systems from the now-public tools. Investigators, however, are not ruling out the possibility that the tools were left exposed on purpose, or that others within the NSA made similar mistakes that ultimately resulted in the Shadow Brokers obtaining them.

To their credit (assuming that it was an honest mistake), the unnamed individual reported their mistake shortly afterwards, according to the NSA--which, it must be mentioned, did not inform the companies of the risk to their systems. Rather, having sought out foreign use of the tools with no results, the NSA saw no need to inform the software manufacturers.

Regardless of blame for the release of these tools into the public domain, the unnamed former NSA representative who left the tools on the remote computer proves that critical data should never leave the safety measures to be found on-premises and taken into the world without considerable measures put in place to ensure its security.

For advisement and assistance in putting measures in place to protect your business from theft, call ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Managed Service Browser Windows 10 Apps Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Windows Gadgets Workplace Strategy Artificial Intelligence Networking Managed IT services Information App WiFi Virtualization Spam Remote Mobile Device Management Business Technology Blockchain Bandwidth Encryption Server Gmail Office Two-factor Authentication Budget Office 365 Employee/Employer Relationship Apple History Information Technology Data Security Big Data Wi-Fi BDR Cybercrime Health Conferencing Access Control Analytics Remote Computing Save Money Patch Management Help Desk Hacking Vendor Remote Monitoring Hacker IT Management Cost Management Training Voice over Internet Protocol Employer-Employee Relationship Compliance Document Management Outlook Password Applications Project Management Vulnerabilities BYOD Computing Money Vendor Management Hard Drive Search... Customer Service Unified Threat Management Firewall Best Practice Data loss Mobile Office Retail Augmented Reality Word Legal Alert Managed Services IBM Hiring/Firing Website Data storage Data Breach Travel The Internet of Things Virtual Reality Paperless Office YouTube Antivirus Social Engineering Cryptocurrency Chrome Maintenance Black Market Cleaning Laptop Monitoring Robot Healthcare Mobile Computing Websites Mobility Marketing Meetings Running Cable Sports Social SaaS DDoS Google Maps Scam Storage Twitter Windows 11 Remote Workers Law Enforcement iPhone Windows 7 Education VPN Cortana End of Support Free Resource Printer Content Filtering Update How To User Router Taxes Google Docs Bluetooth Integration Images 101 Processor Distributed Denial of Service Display Office Tips Memory Private Cloud Physical Security Employees Avoiding Downtime Wireless Technology PowerPoint eWaste Administration Politics Holidays Multi-factor Authentication Start Menu Settings Machine Learning Downloads Downtime Presentation Computer Care Cooperation Specifications Safety Video Conferencing Vulnerability Saving Time IT Consultant Solid State Drive Virtual Desktop Software as a Service Virtual Machines Computer Repair Data Protection Computers Customer Relationship Management Bitcoin Experience Chromebook Co-Managed IT Drones Professional Services Telephone Entertainment Automobile Excel How To Disaster Microchip Managed Services Provider Flexibility Virtual Private Network Tech Terms Lithium-ion battery Managed IT Hack Digital HIPAA Identity Theft Current Events Virtual Assistant Notifications Solutions Unified Communications Processors Administrator Securty Supply Chain Management Access Database Text Messaging Value Proactive IT Organization Time Management Business Owner Bring Your Own Device Domains Cyber security Public Cloud Equifax Cables Health IT Smart Devices Remote Working Spyware Tactics Hard Drive Disposal Music Audit AI Username Trend Micro File Sharing Startup Point of Sale Transportation Freedom of Information Digital Security Cameras Redundancy Electronic Health Records Navigation Botnet Cache Addiction Public Speaking Wasting Time email scam Streaming Media Unified Threat Management Inbound Marketing Rental Service eCommerce Workers Mobile Security Micrsooft Shortcuts Modem Legislation Flash Keyboard News Videos User Tip Surveillance Printing Evernote Network Management Telephone Systems Hard Drives Managing Costs CCTV Business Growth Touchscreen intranet Be Proactive SSID Development Emails Shortcut Employer/Employee Relationships Computer Malfunction Fake News Media Emergency Proxy Server Electronic Payment Wireless Vendor Mangement Service Level Agreement Banking Heating/Cooling Virtual Machine Computing Infrastructure Google Wallet Environment Windows XP Reviews Management Messenger Optimization Samsung Device security Deep Learning Social Networking Workplace Strategies Uninterrupted Power Supply Wireless Headphones Phone System Teamwork Webcam Microsoft Excel 2FA Tech Data Storage Business Mangement Going Green Business Metrics Hypervisor Business Cards Hosted Solution Medical IT Shopping Error Books Tablets Language SQL Server Society Paperless Bookmark Google Calendar Term PCI DSS Download Licensing Supercomputer Piracy Smart Technology Visible Light Communication Gig Economy Virus Reading Humor HTML Computer Accessories Monitors Internet Service Provider Nanotechnology Azure Motion Sickness Windows 8 Business Communications Browsers Staffing Comparison Google Play Regulations Compliance Google Drive Upload IP Address Managed IT Service Software License Advertising Social Network Relocation Memes Displays Net Neutrality Corporate Profile Screen Reader Work/Life Balance Tech Support Human Resources Knowledge Data Analysis Television Security Cameras Financial Data Telephony Trends Employer Employee Relationship Mobile Technology Supply Chain Risk Management Customer Resource management IT Cabling Devices Recovery Tablet Competition G Suite Tip of the week Google Apps Fileless Malware In Internet of Things Mouse Telework VoIP Gamification Troubleshooting Hacks Tracking Company Culture Network Congestion Entrepreneur Workplace Microsoft 365 LiFi Smartwatch Telephone System Reliable Computing Communitications Regulations Writing Documents Procurement Backup and Disaster Recovery Application Web Server Directions SharePoint FinTech Content Digital Payment Desktop Business Intelligence Scams CES Electronic Medical Records Scalability IT Assessment Worker Accountants

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?