
US intelligence agencies
arrested an employee of one of the firms that works with the NSA (contractor). The employee’s name is Harold Martin and he has been dubbed the “Second Snowden” for suspicion of disclosing NSA confidential information. The peculiarity of this case is the fact that the source code of the software that was used by special services in cyber attacks on computer networks of other states was subjected to theft. This, in turn, may indicate the involvement of a former employee in the Shadow Brokers grouping.
After
publishing an archive with Shadow Brokers data in the network, two main versions of the source code acquisition of the Equation Group exploits were discussed. The first implies a successful cyber attack, which caused the leak. Proponents of the second version believe that it is a question of the “second Snowden”, which transmitted the original texts to hackers. As it turned out, the arrested Harold Martin specialist worked in the same firm as Snowden - Booz Allen Hamilton.
The FBI has been secretly arrested by the law.
Harold Martin was arrested on August 27, that is, more than a month ago as a result of an FBI raid on his house. Specialists found a large number of documents and secret information in his home in electronic form, including the source texts of the mentioned secret software.
')
Thus, the hypothesis of supporters of the theory of the presence in the NSA of the “second Snowden” was indeed confirmed. Source codes that were stolen by an employee, suggest that we are talking about the informant Shadow Brokers. In support of this hypothesis, The New York Times cites information that the stolen software is state-sponsored and used for cyber attacks on computer systems in countries such as Russia, China, Iran, and North Korea.
Mr. It was developed by the government of China and Iran.
Recall that the data leakage grouping Equation Group
occurred in mid-August this year and was carried out by hackers Shadow Brokers. The archive contained the source texts of various exploits, among which were three 0day
exploits for Cisco network devices and products.