• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

Hackers Have Allegedly Stolen NSA-Linked ‘Cyber Weapons’ and Are Auctioning Them Off

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
August 16, 2016, 1:05 AM ET
FBI Director James Comey Delivers Keynote Address On Cyber Security At Georgetown University
WASHINGTON, DC - APRIL 26: National Security Agency Director Adm. Michael Rogers, commander of U.S. Cyber Command, speaks on cyber security at Georgetown University on April 26, 2016 in Washington, DC. Rogers joined FBI Director James Comey to address the sixth annual International Conference on "Cyber Engagement: Discussing Critical Policy Alternatives," held by Georgetown University's Master of Science in Foreign Service CyberProject. (Photo by Alex Wong/Getty Images)Alex Wong—Getty Images

The United States government can’t seem to catch a break in cyberspace.

Hackers claim to have stolen attack code from a team of sophisticated cyber spies known as “the Equation Group,” widely believed to be associated with the U.S. National Security Agency, one of the world’s top intelligence outfits. The hackers have offered to sell their purloined exploits to the highest bidder in an online auction conducted in the cryptocurrency Bitcoin.

Although the alleged breach could just be an extravagant hoax, experts who reviewed a preliminary data dump teased alongside the hackers’ garbled sales pitch said that the files, amazingly, looked authentic. “This appears to be legitimate code,” Matt Suiche, a French cybersecurity entrepreneur, wrote in a Medium blog post, echoing what others had posted on Twitter (TWTR).

Get Data Sheet, Fortune’s technology newsletter.

“We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see,” the hackers wrote Saturday on the code-sharing site Github, as well as on Yahoo-owned Tumblr (YHOO) (both later taken down). “This is good proof no? You enjoy!!!”

The lifted goods include exploits allegedly designed to target firewalls and equipment produced by Cisco (CSCO), Juniper Networks (JNPR), Fortinet (FTNT), and Topsec, a Chinese firm. The latest file modifications appear to date back to 2013, and names are consistent with NSA programs leaked by whistleblower Edward Snowden that year, such as “BANANAGLEE,” “EPICBANANA,” and “JETPLOW.”

See also: Can Bitfinex Really Impose a $72 Million Theft on Its Customers?

Details are still sparse, but here’s what the security community is saying. Rather than directly hacking a team within the NSA—the hackers, operating under the nom de guerre “the Shadow Brokers” —likely got their hands on software tools from some compromised computer system, some experts, including a computer security researcher who goes by the alias “the grugq,” have said.

“It might be the compromise of a [listening post] or a trampoline for attacking network appliances and routers of different types,” Claudio Guarnieri, a security researcher familiar with nation state intelligence operations, said in a post on Twitter.

Kaspersky Labs, a Russian antivirus software firm, outed the so-called Equation Group in a report last year. The company tied the NSA-linked group to operations such as “stuxnet,” a digital attack that struck Iranian nuclear infrastructure a decade ago, and “flame,” malicious code that targeted Middle Eastern states around the same time.

See also: How Alex Gibney Made the Most Chilling Documentary Film of the Year

For more on cyberespionage, watch Fortune’s video:

Some onlookers have suggested that the alleged thieves could be linked to Russian intelligence agencies, citing a recent flareup of activity by “Guccifer 2.0,” believed to be a Russia-sponsored puppet account, and the country’s well-known penchant for “false flag” operations, intended to deceive or confuse people.

Others have urged caution of those so casually proposing attributions before thorough investigations can be conducted.

At the time of writing, the Bitcoin address associated with the so-called Shadow Brokers had received a handful of Bitcoin transfers totaling about $24 (the exchange rate was $568.22 per Bitcoin at press time)—nowhere near the crowdsourced half a billion dollars requested to publicly leak an unencrypted version of the remaining 40% of the data.

The hackers said they would end the bidding “when we feel it is time to end,” and would not return money to losers. (Most people agree the auction was a clever—and successful—ploy to attract attention.)

See also: These 10 Companies Are the Top Cybersecurity Startup Acquirers

Meanwhile, whistleblowing website WikiLeaks also said that it had acquired and would publish a copy of the “cyber weapons” cache shortly.

We had already obtained the archive of NSA cyber weapons released earlier today and will release our own pristine copy in due course.

— WikiLeaks (@wikileaks) August 16, 2016

The hackers’ post, written in poor English, ends in a rant against “wealthy elites,” noting that they “run for president.”

“We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control,” they wrote. “If Equation Group lose control of cyber weapons, who else lose or find cyber weapons?”

The NSA, the hackers, and the companies did not immediately respond to Fortune’s request for comment.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

Amazon is still paying Jeff Bezos an $80,000 yearly salary—but $1.6 million for travel and security
Big TechCEO salaries and executive compensation
Amazon is still paying Jeff Bezos an $80,000 yearly salary—but $1.6 million for travel and security
By Marco Quiroz-GutierrezApril 10, 2026
32 minutes ago
Kash Patel sits with his two fingers on lips
CybersecurityIran
First they went after medtech, then Kash Patel. Iranian hackers’ next target is likely ‘low-hanging fruit’ in water, energy, and tourism, experts say
By Jacqueline MunisApril 10, 2026
1 hour ago
scott bessent
CybersecurityFederal Reserve
The AI that found 27-year-old vulnerabilities no human ever caught before just forced an emergency meeting with every major Wall Street CEO
By Jake AngeloApril 10, 2026
3 hours ago
Ukraine will have the most important defense industrial base in the free world, former CIA chief predicts
InnovationDefense
Ukraine will have the most important defense industrial base in the free world, former CIA chief predicts
By Jason MaApril 10, 2026
6 hours ago
A hacker in a dark hoodie and wearing a creepy white mask sits at a keyboard in front of multiple computer monitors in a dark, blue-shaded room.
CybersecurityAnthropic
Anthropic is limiting access to its latest AI model, Mythos. The real risks may already be out there
By Beatrice NolanApril 10, 2026
6 hours ago
‘Downward mobility is incredibly radicalizing’: The college bargain is broken. What comes next could reshape America
EconomyColleges and Universities
‘Downward mobility is incredibly radicalizing’: The college bargain is broken. What comes next could reshape America
By Nick LichtenbergApril 10, 2026
8 hours ago

Most Popular

The U.S. government is spending $88 billion a month in interest on national debt—equal to spending on defense and education combined
Economy
The U.S. government is spending $88 billion a month in interest on national debt—equal to spending on defense and education combined
By Fortune EditorsApril 9, 2026
1 day ago
A Meta employee created a dashboard so coworkers can compete to be the company's No. 1 AI token user—and Zuckerberg doesn't even rank in the top 250
AI
A Meta employee created a dashboard so coworkers can compete to be the company's No. 1 AI token user—and Zuckerberg doesn't even rank in the top 250
By Fortune EditorsApril 9, 2026
1 day ago
Mark Cuban admits he made a mistake letting go of the Mavericks: 'I don't regret selling. I regret who I sold to'
Investing
Mark Cuban admits he made a mistake letting go of the Mavericks: 'I don't regret selling. I regret who I sold to'
By Fortune EditorsApril 9, 2026
1 day ago
'I hate working 5 days': Zoom CEO says traditional work schedules are becoming obsolete—and predicts a 3-day workweek by 2031
Success
'I hate working 5 days': Zoom CEO says traditional work schedules are becoming obsolete—and predicts a 3-day workweek by 2031
By Fortune EditorsApril 9, 2026
1 day ago
Schools across America are quietly admitting that screens in classrooms made students worse off and are reversing years of tech-first policies
Innovation
Schools across America are quietly admitting that screens in classrooms made students worse off and are reversing years of tech-first policies
By Fortune EditorsApril 10, 2026
13 hours ago
Gen Z doesn't want your full-time job. They want several part-time roles, and it's reshaping the entire workforce
Success
Gen Z doesn't want your full-time job. They want several part-time roles, and it's reshaping the entire workforce
By Fortune EditorsApril 9, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.