• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

Hackers Have Allegedly Stolen NSA-Linked ‘Cyber Weapons’ and Are Auctioning Them Off

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
August 16, 2016, 1:05 AM ET
FBI Director James Comey Delivers Keynote Address On Cyber Security At Georgetown University
WASHINGTON, DC - APRIL 26: National Security Agency Director Adm. Michael Rogers, commander of U.S. Cyber Command, speaks on cyber security at Georgetown University on April 26, 2016 in Washington, DC. Rogers joined FBI Director James Comey to address the sixth annual International Conference on "Cyber Engagement: Discussing Critical Policy Alternatives," held by Georgetown University's Master of Science in Foreign Service CyberProject. (Photo by Alex Wong/Getty Images)Alex Wong—Getty Images

The United States government can’t seem to catch a break in cyberspace.

Hackers claim to have stolen attack code from a team of sophisticated cyber spies known as “the Equation Group,” widely believed to be associated with the U.S. National Security Agency, one of the world’s top intelligence outfits. The hackers have offered to sell their purloined exploits to the highest bidder in an online auction conducted in the cryptocurrency Bitcoin.

Although the alleged breach could just be an extravagant hoax, experts who reviewed a preliminary data dump teased alongside the hackers’ garbled sales pitch said that the files, amazingly, looked authentic. “This appears to be legitimate code,” Matt Suiche, a French cybersecurity entrepreneur, wrote in a Medium blog post, echoing what others had posted on Twitter (TWTR).

Get Data Sheet, Fortune’s technology newsletter.

“We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see,” the hackers wrote Saturday on the code-sharing site Github, as well as on Yahoo-owned Tumblr (YHOO) (both later taken down). “This is good proof no? You enjoy!!!”

The lifted goods include exploits allegedly designed to target firewalls and equipment produced by Cisco (CSCO), Juniper Networks (JNPR), Fortinet (FTNT), and Topsec, a Chinese firm. The latest file modifications appear to date back to 2013, and names are consistent with NSA programs leaked by whistleblower Edward Snowden that year, such as “BANANAGLEE,” “EPICBANANA,” and “JETPLOW.”

See also: Can Bitfinex Really Impose a $72 Million Theft on Its Customers?

Details are still sparse, but here’s what the security community is saying. Rather than directly hacking a team within the NSA—the hackers, operating under the nom de guerre “the Shadow Brokers” —likely got their hands on software tools from some compromised computer system, some experts, including a computer security researcher who goes by the alias “the grugq,” have said.

“It might be the compromise of a [listening post] or a trampoline for attacking network appliances and routers of different types,” Claudio Guarnieri, a security researcher familiar with nation state intelligence operations, said in a post on Twitter.

Kaspersky Labs, a Russian antivirus software firm, outed the so-called Equation Group in a report last year. The company tied the NSA-linked group to operations such as “stuxnet,” a digital attack that struck Iranian nuclear infrastructure a decade ago, and “flame,” malicious code that targeted Middle Eastern states around the same time.

See also: How Alex Gibney Made the Most Chilling Documentary Film of the Year

For more on cyberespionage, watch Fortune’s video:

Some onlookers have suggested that the alleged thieves could be linked to Russian intelligence agencies, citing a recent flareup of activity by “Guccifer 2.0,” believed to be a Russia-sponsored puppet account, and the country’s well-known penchant for “false flag” operations, intended to deceive or confuse people.

Others have urged caution of those so casually proposing attributions before thorough investigations can be conducted.

At the time of writing, the Bitcoin address associated with the so-called Shadow Brokers had received a handful of Bitcoin transfers totaling about $24 (the exchange rate was $568.22 per Bitcoin at press time)—nowhere near the crowdsourced half a billion dollars requested to publicly leak an unencrypted version of the remaining 40% of the data.

The hackers said they would end the bidding “when we feel it is time to end,” and would not return money to losers. (Most people agree the auction was a clever—and successful—ploy to attract attention.)

See also: These 10 Companies Are the Top Cybersecurity Startup Acquirers

Meanwhile, whistleblowing website WikiLeaks also said that it had acquired and would publish a copy of the “cyber weapons” cache shortly.

We had already obtained the archive of NSA cyber weapons released earlier today and will release our own pristine copy in due course.

— WikiLeaks (@wikileaks) August 16, 2016

The hackers’ post, written in poor English, ends in a rant against “wealthy elites,” noting that they “run for president.”

“We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control,” they wrote. “If Equation Group lose control of cyber weapons, who else lose or find cyber weapons?”

The NSA, the hackers, and the companies did not immediately respond to Fortune’s request for comment.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

lancaster
AIschools
Two private school boys get probation for using AI to create 350 fake nudes of their classmates
By Mark Scolforo and The Associated PressMarch 25, 2026
5 hours ago
melania
PoliticsWhite House
Enter Melania Trump, escorted by humanoid robot: ‘I’m Figure 03, a humanoid built for the United States of America’
By Darlene Superville and The Associated PressMarch 25, 2026
5 hours ago
bernie
AICongress
Bernie Sanders and AOC launch bill to ban new data-center construction
By Matthew Daly and The Associated PressMarch 25, 2026
5 hours ago
Big TechSocial Media
A court just ruled that tech addiction is real—and dangerous. It could be Meta and YouTube’s Big Tobacco moment
By Kristin StollerMarch 25, 2026
6 hours ago
Warner gestures
AIAmerican Politics
New college grad unemployment will spike to 35% in 2 years, senator warns, forcing ‘Dario, Sam’ to quit AI fear-mongering
By Jacqueline MunisMarch 25, 2026
7 hours ago
Big TechMeta
Meta and YouTube found liable in landmark child social media harm case, ordered to pay $3 million—with punitive damages still to come
By Kaitlyn Huamani, Barbara Ortutay and The Associated PressMarch 25, 2026
8 hours ago

Most Popular

Magazine
The youngest-ever female CEO of a Fortune 500 company is fighting Trump's cuts to keep Medicaid strong
By Fortune EditorsMarch 24, 2026
2 days ago
Commentary
The Treasury just declared the U.S. insolvent. The media missed it
By Fortune EditorsMarch 23, 2026
2 days ago
Success
Palantir’s billionaire CEO says only two kinds of people will succeed in the AI era: trade workers — ‘or you’re neurodivergent’
By Fortune EditorsMarch 24, 2026
1 day ago
Success
The job market is so bad that ‘reverse recruiters’ are charging $1,500 a month just to help people look for jobs
By Fortune EditorsMarch 25, 2026
18 hours ago
Energy
Nobel laureate Paul Krugman calls it 'treason': $580 million in suspicious oil futures traded minutes before Trump's Iran reversal
By Fortune EditorsMarch 24, 2026
1 day ago
Success
JPMorgan has started monitoring the keystrokes, video calls, and meetings of its junior investment bankers—and they say it's for employee well-being
By Fortune EditorsMarch 24, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.