Shadow Brockers - Monero

in #steemit7 years ago (edited)

The Shadow Brokers group has increased the price of its premium service to so-called access to NSA exploits.

Clearly, the Shadow Brokers group does nothing like everyone else. He decided to significantly increase the price of his premium service to access the original exploits of the NSA. To benefit from it, it will cost 200 ZEC (Zcash is the equivalent of 65,000 dollars) or 1000 XMR (Monero is the equivalent of 46,000 dollars). This is twice the amount requested for the first subscription.

In mid-May, the Shadow Brokers had lifted the veil on its private club providing for the delivery of a "Monthly Data Dump". On May 30th, they gave more details on how to subscribe to their private club. Interested persons were to send "between 1 and 30 June 100 ZEC" to a specific address, that is to say approximately 22 000 dollars. In a message, the group explained testing Zcash rather than the bitcoin and granting the possibility to change crypto-change. This is done by integrating Monero.

VIP service and account settlement

If the increase is already something surprising in itself, the experts also wonder about the fallout from the sale in June. There is no evidence that someone has paid and got codes. The Shadow Brokers explain in a message that "another global cyber attack has just taken place at the end of the first month of the Shadowbrokers dump service". The group obviously refers to the Petya / NotPetya epidemic. Like its counterpart WannaCry, the malware used exploits of the NSA unveiled last April by Shadow Brokers. But nothing says that the recent wave of attacks is linked to new revelations of the group.

As a complement to its club offering, Shadow Brokers unveil a VIP service that provides people with specific exploits. This offer has a cost, 400 ZEC (about $ 131,000). Finally, in his message, the group of pirates settles its accounts with a person designated under the pseudonym "Doctor". According to them, it would be "a former developer of the Equation group who made several tools for the NSA and hacked several organizations in China." He currently suspects "Doctor" of being "the co-founder of a security company and having a lot of venture capital". And to ask him to subscribe to the Club in July under an e-mail address recognizable (doctor@newsecuritycompany.com), under penalty in the event of refusal to swing the identity of the Doctor and his company. This person could be Daniel Wolfford, security specialist and working for DarkMatter, a company specializing in mobile security in the Middle East. He issued several tweets denying having worked for the group Equation.

Sort:  

Congratulations! This post has been upvoted from the communal account, @minnowsupport, by iTsWaiiirox from the Minnow Support Project. It's a witness project run by aggroed, ausbitbank, teamsteem, theprophet0, and someguy123. The goal is to help Steemit grow by supporting Minnows and creating a social network. Please find us in the Peace, Abundance, and Liberty Network (PALnet) Discord Channel. It's a completely public and open space to all members of the Steemit community who voluntarily choose to be there.

If you like what we're doing please upvote this comment so we can continue to build the community account that's supporting all members.