
Unknowns laid out in open access part of the work of the
state sponsored APT of the Equation group responsible for conducting large-scale and technologically complex cyber attacks, such as Stuxnet, Duqu, Flame, Duqu2. The main part of the files stolen during the hacking will be sold at a specialized auction.
Equation Group began operating in 1996. Several tens of thousands of different structures were attacked: government agencies, information and aerospace agencies, energy and military companies, financial institutions, various Muslim leaders. The main damage was caused to countries such as Iran, Russia, Pakistan, Afghanistan, India, China and Syria. Britain, Germany and France have also been subjected to cyber attacks.
This group is credited with the development of complex systems for targeted attacks such as Stuxnet, Duqu and Flame. Also, some experts attribute this grouping to the NSA responsible for the so-called. "Operation" Olympic Games ":
According to the Atlantic Monthly, the operation "Olympic Games" is "probably the most significant hidden manipulation in the electronic sphere since the Second World War, when cryptanalysts cracked the Enigma cipher". The New Yorker claims that Operation Olympics is “the first official act of cyber-sabotage of the United States against another country, with the exception of conventional electronic warfare like those used during the invasion of Iraq
The data was published on the Tumblr media service page:
https://theshadowbrokers.tumblr.com/')
We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. Equation Group files, you see.
For information provided a small data dump. The full archive will be received by the one who sent the highest bid to Bitcoin. Moreover, the persons who posted the archive assume that representatives of the Equation Group will also take part in the auction and the rates will be quite high. The contents of the archive is not indicated, which creates a great deal of intrigue.
Free archive for review:
"
Magnet:? Xt = urn: btih: 40a5f1514514fb67943f137f7fde0a7b5e991f76 & tr = http: //diftracker.i2p/announce.php»
Https://mega.nz/#!zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU»
Https://app.box.com/s/amgkpu1d9ttijyeyw2m4lso3egb4sola»
Https://www.dropbox.com/s/g8kvfl4xtj2vr24/EQGRP-Auction-Files.zip»
Https://ln.sync.com/dl/5bd1916d0#eet5ufvg-tjijei4j-vtadjk6b-imyg2qkd»
Https://yadi.sk/d/QY6smCgTtoNz6Free Files (Proof): eqgrp-free-file.tar.xz.gpg
sha256sum = b5961eee7cb3eca209b92436ed7bdd74e025bf615b90c408829156d128c7a169
gpg --decrypt --output eqgrp-free-file.tar.xz eqgrp-free-file.tar.xz.gpg
Password = theequationgroup
Equation Group Leakage Study Group:
telegram.me/equationgroupleak