The Shadow Burk Analysis

516 Words2 Pages

Spying has been an important topic in the news lately. People are spied on every day by many entities. In this case an agency’s spying activities has been exposed to the public. Per itworld.com “A hacking group has released suspected U.S government files that show the National Security Agency may have spied on banks across the Middle East”. The hacking group goes by the name of The Shadow Brokers. The Shadow Brokers are a hacking group that publishes leaks aimed at agencies such as the NSA. The group was started in the summer of 2016 aiming to cripple the governments security infrastructure by exposing their activities unknown to the public. The NSA leak also contained hacking tools that NSA currently use that were tested and successfully work. …show more content…

The Middle Eastern Baking leak contained documents explaining in detail the design of a company called EastNets. EastNets is a company located in Dubai that specializes in cracking down on money laundering. In the documents leaked from EastNets was a PowerPoint presentation that was labeled as top secret. The top-secret presentation displayed a visual representation of logs that determine the NSA was considering oil companies located in the Middle East. Some sources believe the leaked information to be fabricated. But if found to be true, could be a great threat. Per Matt Suiche, an owner of a security firm he wrote that “This is the first time to date that so much information had been published on how a SWIFT Service Bureau actually works and its internal infrastructure”. EastNets have claimed the following leak to be …show more content…

This leak can potentially be bad for Microsoft because the hacking tools leak are aimed towards Microsoft Operating Systems such as Windows Xp, Windows 7, Windows 8, and Windows Vista. Therefore, novice hackers will have the knowledge and the ability to compromise Windows based computer systems. After finding out about the leak, Microsoft responded saying “will take the necessary actions to protect our customers”. The following events are slowly diminishing the integrity and dignity of the

Open Document