Caution! NSA hacking tools for Windows are freely available

If you use it you'll do well to be careful next time. Hacking tools allegedly owned by the NSA that can break into Windows systems are freely circulating online by the notorious group Shadow Brokers.

For those who don't know, the group allegedly intercepted the tools from the NSA last summer. The specific tools can be used for the almost all versions of Windows, except maybe Windows 10.NSA

On the other hand, data leakage seems to include exploits that can bypass Windows 10 security, although the majority of hacking tools have been designed for older versions of the operating system, such as Windows XP, Windows 7, and Windows 8.1. There are also many hacking tools for versions of Windows Server.

Microsoft has yet to issue any announcement yet as the leak happened over the weekend and Easter holiday. The fact has the effect that they are in danger of Windows.

Security experts warn that with these hacking tools available online, the number of attacks targeting Windows systems will skyrocket over the weekend, mainly because even novice hackers will be able to violate their operating systems Microsoft.

Edward Snowden also confirmed the leak, explaining that "NSA exploits affect many fully updated Windows systems that circulate freely."

Let's mention its tools NSAs had already been published but were encrypted. Shadow Brokers just mentioned the EQGRP-Auction-Files filename and gave the decryption code: CrDj ”(; Va.*NdlnzB9M?@K2) #> deB7mN

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).