• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

Hackers Have Allegedly Stolen NSA-Linked ‘Cyber Weapons’ and Are Auctioning Them Off

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
August 16, 2016, 1:05 AM ET
FBI Director James Comey Delivers Keynote Address On Cyber Security At Georgetown University
WASHINGTON, DC - APRIL 26: National Security Agency Director Adm. Michael Rogers, commander of U.S. Cyber Command, speaks on cyber security at Georgetown University on April 26, 2016 in Washington, DC. Rogers joined FBI Director James Comey to address the sixth annual International Conference on "Cyber Engagement: Discussing Critical Policy Alternatives," held by Georgetown University's Master of Science in Foreign Service CyberProject. (Photo by Alex Wong/Getty Images)Alex Wong—Getty Images

The United States government can’t seem to catch a break in cyberspace.

Hackers claim to have stolen attack code from a team of sophisticated cyber spies known as “the Equation Group,” widely believed to be associated with the U.S. National Security Agency, one of the world’s top intelligence outfits. The hackers have offered to sell their purloined exploits to the highest bidder in an online auction conducted in the cryptocurrency Bitcoin.

Although the alleged breach could just be an extravagant hoax, experts who reviewed a preliminary data dump teased alongside the hackers’ garbled sales pitch said that the files, amazingly, looked authentic. “This appears to be legitimate code,” Matt Suiche, a French cybersecurity entrepreneur, wrote in a Medium blog post, echoing what others had posted on Twitter (TWTR).

Get Data Sheet, Fortune’s technology newsletter.

“We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see,” the hackers wrote Saturday on the code-sharing site Github, as well as on Yahoo-owned Tumblr (YHOO) (both later taken down). “This is good proof no? You enjoy!!!”

The lifted goods include exploits allegedly designed to target firewalls and equipment produced by Cisco (CSCO), Juniper Networks (JNPR), Fortinet (FTNT), and Topsec, a Chinese firm. The latest file modifications appear to date back to 2013, and names are consistent with NSA programs leaked by whistleblower Edward Snowden that year, such as “BANANAGLEE,” “EPICBANANA,” and “JETPLOW.”

See also: Can Bitfinex Really Impose a $72 Million Theft on Its Customers?

Details are still sparse, but here’s what the security community is saying. Rather than directly hacking a team within the NSA—the hackers, operating under the nom de guerre “the Shadow Brokers” —likely got their hands on software tools from some compromised computer system, some experts, including a computer security researcher who goes by the alias “the grugq,” have said.

“It might be the compromise of a [listening post] or a trampoline for attacking network appliances and routers of different types,” Claudio Guarnieri, a security researcher familiar with nation state intelligence operations, said in a post on Twitter.

Kaspersky Labs, a Russian antivirus software firm, outed the so-called Equation Group in a report last year. The company tied the NSA-linked group to operations such as “stuxnet,” a digital attack that struck Iranian nuclear infrastructure a decade ago, and “flame,” malicious code that targeted Middle Eastern states around the same time.

See also: How Alex Gibney Made the Most Chilling Documentary Film of the Year

For more on cyberespionage, watch Fortune’s video:

Some onlookers have suggested that the alleged thieves could be linked to Russian intelligence agencies, citing a recent flareup of activity by “Guccifer 2.0,” believed to be a Russia-sponsored puppet account, and the country’s well-known penchant for “false flag” operations, intended to deceive or confuse people.

Others have urged caution of those so casually proposing attributions before thorough investigations can be conducted.

At the time of writing, the Bitcoin address associated with the so-called Shadow Brokers had received a handful of Bitcoin transfers totaling about $24 (the exchange rate was $568.22 per Bitcoin at press time)—nowhere near the crowdsourced half a billion dollars requested to publicly leak an unencrypted version of the remaining 40% of the data.

The hackers said they would end the bidding “when we feel it is time to end,” and would not return money to losers. (Most people agree the auction was a clever—and successful—ploy to attract attention.)

See also: These 10 Companies Are the Top Cybersecurity Startup Acquirers

Meanwhile, whistleblowing website WikiLeaks also said that it had acquired and would publish a copy of the “cyber weapons” cache shortly.

We had already obtained the archive of NSA cyber weapons released earlier today and will release our own pristine copy in due course.

— WikiLeaks (@wikileaks) August 16, 2016

The hackers’ post, written in poor English, ends in a rant against “wealthy elites,” noting that they “run for president.”

“We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control,” they wrote. “If Equation Group lose control of cyber weapons, who else lose or find cyber weapons?”

The NSA, the hackers, and the companies did not immediately respond to Fortune’s request for comment.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
Fortune Secondary Logo
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

U.S. President Donald Trump delivers the State of the Union address during a joint session of Congress in the House Chamber at the Capitol on February 24, 2026 in Washington, D.C.
EnergyData centers
Your utility bills keep going up. Here’s everyone you can blame—AI data centers included
By Jordan BlumMarch 1, 2026
1 hour ago
PoliticsColleges and Universities
Pentagon chief blocks officers from attending Ivy League schools and other top universities, including partners on AI and space
By Jason MaFebruary 28, 2026
9 hours ago
AIAnthropic
Anthropic CEO Dario Amodei says ‘we are patriotic Americans’ committed to defending the U.S. but won’t budge on ‘red lines’
By Jason MaFebruary 28, 2026
14 hours ago
sarandos
InvestingMedia
3 things we will never know after Netflix pulled out of the Warner Bros. bidding, handing it to Paramount
By Nick LichtenbergFebruary 28, 2026
17 hours ago
OpenAI CEO Sam Altman
AIAnthropic
OpenAI sweeps in to ink deal with Pentagon as Anthropic is designated a ‘supply chain risk’—an unprecedented action likely to crimp its growth
By Jeremy KahnFebruary 28, 2026
17 hours ago
Big TechAmerican Politics
Your spend as a ‘weapon’: Scott Galloway’s ‘Resist and Unsubscribe’ movement asks you to ditch Amazon, Apple, and Netflix to oppose Trump
By Kristin StollerFebruary 28, 2026
21 hours ago

Most Popular

placeholder alt text
Success
Japanese companies are paying older workers to sit by a window and do nothing—while Western CEOs demand super-AI productivity just to keep your job
By Orianna Rosa RoyleFebruary 27, 2026
2 days ago
placeholder alt text
Middle East
Iran is now on 'death ground' amid existential threat from U.S. attacks and could 'go big' in retaliation, former NATO commander warns
By Jason MaFebruary 28, 2026
16 hours ago
placeholder alt text
AI
The week the AI scare turned real and America realized maybe it isn't ready for what's coming
By Nick LichtenbergFebruary 28, 2026
23 hours ago
placeholder alt text
Success
Walmart exec says U.S. workforces needs to take inspiration from China where ‘5 year-olds are learning DeepSeek’
By Preston ForeFebruary 27, 2026
2 days ago
placeholder alt text
Personal Finance
Current price of gold as of February 27, 2026
By Danny BakstFebruary 27, 2026
2 days ago
placeholder alt text
Middle East
Dubai’s worst nightmare unfolds as Iran strikes Gulf neighbors
By Dana Khraiche, Fiona MacDonald and BloombergFebruary 28, 2026
11 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.