Cloak and Dagger: The ShadowBrokers (WannaCry and NotPetya Part 1 of 3)

The Shadow Brokers

In 2017, a hacking group known as the ShadowBrokers launched a major cyberattack on the National Security Agency (NSA). This is a branch of the United States government which is well known for being up-to-date in terms of security and infrastructure. Thus, it was known as one of the most significant cyberattacks in recent history. The attack was carried out by a group of hackers known as the ShadowBrokers, who released a toolset of hacking tools that had been developed by the NSA.

The attack was a major blow to the NSA, as the toolset contained a variety of hacking tools that could be used to gain access to sensitive information. The tools included exploits for Windows, Linux, and other operating systems, as well as tools for bypassing security measures. The tools were also capable of bypassing encryption, allowing the hackers to gain access to confidential data. The tools were also capable of bypassing antivirus software, allowing the hackers to gain access to sensitive information.

Two major tools that were of value were EternalBlue and BlueKeep. EternalBlue was a tool that allowed the hackers to gain access to Windows systems, while BlueKeep was a tool that allowed the hackers to gain access to Windows machines by taking advantage of a flaw, or exploit, in the Windows Remote Desktop protocol. These two vulnerabilities would eventually prove detrimental to the world, as they would be used in the WannaCry and NotPetya attacks.

This cyber attack was a major embarrassment for the NSA, as it revealed that the agency had been using its own tools to spy on its own citizens. The attack also revealed that the NSA had been using its tools to spy on foreign governments, which was a violation of international law. It was also a wake-up call for the United States government, as it highlighted the need for better security measures to protect against cyberattacks. The US government has since implemented a number of measures to improve its cybersecurity, including the establishment of the Cybersecurity and Infrastructure Security Agency (CISA).

The ShadowBrokers attack was a major event in the history of cybersecurity, and it serves as a reminder of the importance of having strong security measures in place to protect against cyberattacks. The attack also serves as a reminder of the need for governments to be aware of the potential risks posed by cyberattacks, and to take steps to protect their citizens and their data.

Signing off for now,


Site Redesign in the Works

4 minute read

Why I am redesigning the site I am redesigning my blog, with a custom theme, due to the fact that it currently looks like a generic Jekyll blog. I want to m...

AI & Ethics: Navigating the Complex Landscape

9 minute read

What Are AI Ethics AI ethics is the branch of the ethics of technology that deals with the moral implications of developing and using artificial intelligenc...

The ACE that aced Ace Ventura

14 minute read

Humble beginnings The Alliance for Creativity and Entertainment (ACE) is a coalition of over 30 major global entertainment companies and film studios that a...

The Dark Net

6 minute read

What is the Dark Net? The dark net is a part of the internet that isn’t indexed by search engines and can’t be easily accessed using standard web browsers l...

A Technical Analysis of Onion Routing

5 minute read

What is ‘Onion Routing’ Onion routing is the process of encrypting internet traffic in layers, much like the layers of an onion, to protect user privacy and...

What is Stuxnet?

7 minute read

The Zero Day (0-Day) The year was 2010. The world was still reeling from the 2008 financial crisis, and the United States was in the midst of a presidential...

What is MFA?

8 minute read

A Basic Overview What is MFA? Multi-factor authentication (MFA) is a security measure that requires users to provide two or more pieces of evidence (or “fa...

Announcing Comment/Reaction Functionality!

3 minute read

Comment Functionality I am excited to announce that I have added comment functionality to this blog! This means that you can now comment on posts, and I wil...

AI and Writing

3 minute read

AI Generated Stories/Writing In recent years, Artificial Intelligence (AI) has been making its way into the world of writing. AI generated stories are becom...

AI and the Future of the Modern Workplace

4 minute read

AI and Jobs AI has had a major impact on the job market. AI is being used to automate many tasks, such as data entry and customer service. This has led to t...

AI and Programming

2 minute read

AI Generated Code AI generated code is a relatively new concept that has been gaining traction in the programming world. AI code is code that is generated b...

AI and Art: A Basic Overview

2 minute read

AI Generated Art AI and art have been intertwined for decades, but the recent emergence of AI-generated art has sparked a new wave of controversy. AI art, a...

What is Ransomware?

3 minute read

What Is Ransomware? Ransomware is a type of malicious software, or malware, that is designed to block access to a computer system or data until a ransom is ...

Hello, World!

less than 1 minute read

Testing 123! Does this thing work? This is a test post. This is only a test post. If this were a real post, it would have content. But it’s not, so it doesn...