ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Was the NSA Hacked By Enemies Abroad, or Was It an Inside Job?

Not long ago, a group referring to itself as the Shadow Brokers distributed hacking tools utilized by the United States National Security Agency (NSA), on various publically-accessible websites. While the motives of the Shadow Brokers are a story for another time, an investigation seems to have locked in on a particular theory of how the Shadow Brokers came into possession of the tools in the first place.

Hypotheses were initially varied as to how the tools were taken from the NSA at all. Some surmised that the leak must have been the work of another agency insider following the lead of the controversial Edward Snowden. Some suspected that Russia, deemed responsible by D.C. lawmakers, had hacked into the NSA headquarters located in Fort Meade.

However, the FBI has begun to focus their efforts on an entirely different source, one that--while certainly less openly malicious than a foreign attack or insider leak--still shows the dangers that human error can present to cyber security.

Based on information provided by the NSA, investigators are looking into reports that an individual associated with the agency, either as an employee or a contractor, had left the tools on a remote computer during an operation approximately three years ago. These tools would allow their users to exploit systems from Fortinet Inc. and Cisco Systems.

Patches have since been released to help protect these systems from the now-public tools. Investigators, however, are not ruling out the possibility that the tools were left exposed on purpose, or that others within the NSA made similar mistakes that ultimately resulted in the Shadow Brokers obtaining them.

To their credit (assuming that it was an honest mistake), the unnamed individual reported their mistake shortly afterwards, according to the NSA--which, it must be mentioned, did not inform the companies of the risk to their systems. Rather, having sought out foreign use of the tools with no results, the NSA saw no need to inform the software manufacturers.

Regardless of blame for the release of these tools into the public domain, the unnamed former NSA representative who left the tools on the remote computer proves that critical data should never leave the safety measures to be found on-premises and taken into the world without considerable measures put in place to ensure its security.

For advisement and assistance in putting measures in place to protect your business from theft, call ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Smartphones Small Business Microsoft Office Upgrade Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Windows 10 Facebook Business Continuity Covid-19 Passwords Holiday Disaster Recovery Apps IT Support Managed Service Browser Windows 10 Miscellaneous Cloud Computing Outsourced IT Internet of Things Remote Work Managed Service Provider Data Management Government Saving Money Operating System Networking Workplace Strategy Windows Gadgets Artificial Intelligence Managed IT services Bandwidth Server Information Remote WiFi Encryption Mobile Device Management App Virtualization Business Technology Spam Blockchain Budget Employee/Employer Relationship Gmail Apple Office Information Technology Two-factor Authentication Office 365 History Wi-Fi Analytics Access Control Cybercrime Data Security Big Data BDR Health Conferencing Remote Computing Compliance Patch Management Vendor Remote Monitoring Cost Management Help Desk Voice over Internet Protocol Hacking IT Management Document Management Employer-Employee Relationship Training Hacker Save Money Hiring/Firing Firewall Outlook Augmented Reality Password BYOD Word Applications Computing IBM Website Vendor Management Vulnerabilities Hard Drive Project Management Mobile Office Search... Legal Managed Services Best Practice Data storage Data loss Retail Money Alert Customer Service Unified Threat Management User Black Market Update Cleaning Data Breach iPhone Robot Education Cortana Content Filtering Paperless Office Chrome Antivirus Maintenance Router Monitoring Mobile Computing Healthcare Twitter The Internet of Things YouTube Remote Workers Marketing Websites Windows 11 Law Enforcement Windows 7 Meetings Running Cable End of Support Mobility Printer Free Resource Laptop Storage Google Maps Scam How To Travel Virtual Reality VPN Social Social Engineering Sports SaaS Cryptocurrency DDoS Managed IT Digital Employees Avoiding Downtime Disaster Taxes Politics Holidays Settings Machine Learning Processor Cooperation Lithium-ion battery Video Conferencing Solid State Drive Physical Security Virtual Machines Computer Repair Processors PowerPoint Administration Chromebook Drones Multi-factor Authentication Professional Services Automobile Presentation Specifications Start Menu Computer Care IT Consultant Saving Time Downloads How To Microchip Vulnerability Managed Services Provider Bitcoin Flexibility Customer Relationship Management Computers Virtual Private Network Co-Managed IT Software as a Service Wireless Technology Entertainment eWaste Telephone Data Protection Identity Theft Current Events Hack Notifications Downtime Unified Communications Excel Solutions Safety Google Docs Virtual Desktop Integration Images 101 Bluetooth Display Experience Distributed Denial of Service Office Tips Tech Terms Virtual Assistant Private Cloud HIPAA Memory Content Desktop Wasting Time Staffing Botnet Modem Point of Sale IP Address Web Server Rental Service Electronic Medical Records Micrsooft Accountants eCommerce SharePoint Database Surveillance Digital Payment Videos Flash Business Owner Telephone Systems Business Growth Managing Costs Worker Shortcuts Access SSID Health IT Equifax Tactics Development Time Management Hard Drive Disposal Employer/Employee Relationships Public Cloud Media Banking Username Google Wallet Virtual Machine Recovery Be Proactive Competition Spyware Freedom of Information Messenger Reviews Deep Learning Audit Startup Optimization Addiction LiFi email scam Teamwork File Sharing Entrepreneur Navigation 2FA Inbound Marketing Business Metrics Data Storage Hosted Solution Redundancy Mobile Security Hypervisor Documents Workplace Strategies Application Cache News Medical IT Business Intelligence Books User Tip Shopping Legislation Language Network Management Society Unified Threat Management SQL Server Workers Evernote Paperless PCI DSS Licensing Securty Visible Light Communication Fake News Domains CCTV Electronic Payment Reading Proxy Server Gig Economy Monitors Printing Emails Humor Service Level Agreement Internet Service Provider Windows 8 Touchscreen Computing Infrastructure Azure Business Communications Smart Technology Computer Malfunction Management Regulations Compliance Emergency Device security Managed IT Service Advertising Vendor Mangement Microsoft Excel Relocation Phone System Displays Wireless Headphones Memes Work/Life Balance Going Green Net Neutrality Tech Support Business Cards Samsung Tech Human Resources Public Speaking Webcam Error Financial Data Uninterrupted Power Supply Streaming Media Business Mangement Bookmark Risk Management IT Google Apps Download Piracy Tablets Keyboard In Internet of Things Term Supply Chain Hard Drives Hacks Telework Computer Accessories Network Congestion HTML Communitications Microsoft 365 Supercomputer intranet Reliable Computing Browsers Smartwatch Writing Google Calendar Nanotechnology Upload Procurement Virus Software License Wireless Shortcut Google Play Workplace Heating/Cooling Motion Sickness Environment Social Network FinTech IT Assessment Windows XP Google Drive Social Networking Scalability Data Analysis CES Comparison Screen Reader Security Cameras Text Messaging Trends Supply Chain Management Proactive IT Mobile Technology Value Administrator Scams Bring Your Own Device Customer Resource management Organization Knowledge Devices Cyber security Corporate Profile Smart Devices Telephony Tip of the week Employer Employee Relationship Fileless Malware Television Troubleshooting Gamification Remote Working Music Company Culture Cabling Cables G Suite Telephone System AI Regulations Trend Micro Tablet Mouse Backup and Disaster Recovery Electronic Health Records VoIP Transportation Tracking Directions Digital Security Cameras

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?