• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechNSA

Hacker Documents Show NSA Tools for Breaching Global Money Transfer System

By
Reuters
Reuters
Down Arrow Button Icon
By
Reuters
Reuters
Down Arrow Button Icon
April 16, 2017, 10:10 AM ET

Documents and computer files released by hackers provide a blueprint for how the U.S. National Security Agency likely used weaknesses in commercially available software to gain access to the global system for transferring money between banks, a review of the data showed.

On Friday, a group calling itself the Shadow Brokers released documents and files indicating NSA had accessed the SWIFT money-transfer system through service providers in the Middle East and Latin America. That release was the latest in a series of disclosures by the group in recent months.

Matt Suiche, founder of cybersecurity firm Comae Technologies, wrote in a blog post that screen shots indicated some SWIFT affiliates were using Windows servers that were vulnerable at the time, in 2013, to the Microsoft exploits published by the Shadow Brokers. He said he concluded that the NSA took advantage and got in that way.

“As soon as they bypass the firewalls, they target the machines using Microsoft exploits,” Suiche told Reuters. Exploits are small programs for taking advantage of security flaws. Hackers use them to insert back doors for continued access, eavesdropping or to insert other tools.

Microsoft Says It Has Patched Leaked NSA Hacks

“We now have all of the tools the NSA used to compromise SWIFT (via) Cisco firewalls, Windows,” Suiche said.

Reuters was not able to independently verify the authenticity of the documents released by the hackers. Microsoft acknowledged the vulnerabilities and said they had been patched. Cisco Systems Inc has previously acknowledged that its firewalls had been vulnerable.

Cisco and the NSA did not reply to requests for comment.

A PowerPoint presentation that was part of the most recent Shadow Brokers release indicates the NSA used a tool codenamed BARGLEE to breach the SWIFT service providers’ security firewalls.

The NSA’s official seal appeared on one of the slides in the presentation, although Reuters could not independently determine the authenticity of the slides.

Microsoft’s Quiet Patch of Shadow Broker NSA-Hacks Signals Policy Win

The slide referred to ASA firewalls. Cisco is the only company that makes ASA firewalls, according to a Cisco employee who spoke on condition of anonymity. ASA stands for Adaptive Security Appliance and is a combined firewall, antivirus, intrusion prevention and virtual private network, or VPN.

Documents included in the Shadow Brokers release suggest that the NSA, after penetrating the firewall of the SWIFT service providers, used Microsoft exploits to target the computers interacting with the SWIFT network, Comae Technologies’ Suiche said.

The Al Quds Bank for Development and Investment, for example, was running a Windows 2008 server that at the time was vulnerable to newly disclosed Windows exploits, he said.

Microsoft late on Friday said it had determined that prior patches to dozens of software versions had fixed the flaws that apparently were exploited by nine of the NSA programs. Four of the vulnerabilities were blocked by comprehensive updates on March 14. That left only older, unsupported versions of Windows operating systems and Exchange email servers at risk to three of the newly released exploits, the company said.

Pentagon Recruits Cyber Experts to Fight Islamic State

Earlier Friday, Microsoft had said the company had not been warned by the government or other outsiders about the stolen programs.

Microsoft declined to say how it learned of the exploits without outside help. The company’s security systems are capable of detecting attacks against customers, and Microsoft in the past has monitored discussion about exploits on the Internet and also hired former intelligence agency veterans to help it devise programming to protect its software from encroachment.

The NSA targeted nine computer servers at a SWIFT contractor, Dubai-based service bureau EastNets, according to the documents. The U.S. intelligence agency then used lines of code to query the SWIFT servers and Oracle databases handling the SWIFT transactions, according to the documents.

EastNets on Friday denied it had been hacked.

About the Author
By Reuters
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

The fruit fly cancer researcher who built his first prototype out of lollipop sticks and straws
NewslettersTerm Sheet
The fruit fly cancer researcher who built his first prototype out of lollipop sticks and straws
By Allie GarfinkleMay 1, 2026
29 minutes ago
Apple CEO Tim Cook in Washington, D.C. on December 10, 2025. (Tom Williams/CQ-Roll Call/Getty Images)
NewslettersFortune Tech
Tim Cook’s advice for Apple’s next CEO
By Andrew NuscaMay 1, 2026
1 hour ago
Newly appointed Apple CEO John Ternus (left) with outgoing CEO Tim Cook in Cupertino, Calif. (Photo courtesy Apple)
PoliticsMarkets
Apple’s new CEO said he will continue the company’s tradition of secrecy—and Wall Street loved it
By Jim EdwardsMay 1, 2026
2 hours ago
Hitting the ‘GenAI wall’: Where generative AI stops working, and what it means for your talent strategy
AILeadership
Hitting the ‘GenAI wall’: Where generative AI stops working, and what it means for your talent strategy
By François Candelon and Iavor BojinovMay 1, 2026
2 hours ago
Evan Spiegel wears a black t-shirt and speaks into a microphone while on stage.
AITech
Snap CEO praises AI for writing two-thirds of the company’s code but warns fellow tech executives underestimate ‘societal pushback’ to the tech
By Sasha RogelbergMay 1, 2026
3 hours ago
Meta wants to spend more even after it lost $80 billion on the Metaverse and over 20 million users
Big TechMeta
Meta wants to spend more even after it lost $80 billion on the Metaverse and over 20 million users
By Marco Quiroz-GutierrezMay 1, 2026
4 hours ago

Most Popular

Apple cofounder Ronald Wayne—whose stake would be worth up to $400 billion had he not sold it in 1976—says that at 91, he has no regrets
Success
Apple cofounder Ronald Wayne—whose stake would be worth up to $400 billion had he not sold it in 1976—says that at 91, he has no regrets
By Preston ForeApril 27, 2026
4 days ago
China dominates the world's lithium supply. The U.S. just found 328 years' worth in its own backyard
North America
China dominates the world's lithium supply. The U.S. just found 328 years' worth in its own backyard
By Jake AngeloApril 30, 2026
17 hours ago
Accenture's Julie Sweet blew up 50 years of company history. She says the hardest part is still ahead
Conferences
Accenture's Julie Sweet blew up 50 years of company history. She says the hardest part is still ahead
By Nick LichtenbergApril 29, 2026
2 days ago
Google Cloud revenue is now 18% of Alphabet's business. Is this the beginning of the end of Google's search identity?
Big Tech
Google Cloud revenue is now 18% of Alphabet's business. Is this the beginning of the end of Google's search identity?
By Alexei OreskovicApril 29, 2026
1 day ago
With no end in sight, Trump considers new options in Iran war—including the ‘Dark Eagle’ hypersonic missile
Big Tech
With no end in sight, Trump considers new options in Iran war—including the ‘Dark Eagle’ hypersonic missile
By Jim EdwardsApril 30, 2026
1 day ago
America shot its arsenal empty in 2 wars. Now it needs Beijing's permission to reload
Commentary
America shot its arsenal empty in 2 wars. Now it needs Beijing's permission to reload
By Steve H. Hanke and Jeffrey WengApril 30, 2026
18 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.