Editing The Shadow Brokers

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016.They published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group" They are responsible for the WannaCry Ransomware Attack.
The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016.[1][2] They published several leaks containing hacking tools, including several zero-day exploits,[1] from the "Equation Group" They are responsible for the WannaCry Ransomware Attack.




Line 9: Line 9:


Get Away with their Crimes. (Failed)|hobby=Hacking People's Computers|alias=TSB|origin=Middle East|skills=Manipulation  
Get Away with their Crimes. (Failed)|hobby=Hacking People's Computers|alias=TSB|origin=Middle East|skills=Manipulation  
Strategy|crimes=1. Corruption
Strategy|crimes=Corruption
 
Terrorism
2. Terrorism
Theft
 
Hijacking
3. Theft
Hacking|occupation=Hacking Group}}
 
4. Hijacking
 
 
 
5. Hacking|occupation=Hacking Group|Image=Shadowbrokers.jpg}}


== Name and alias ==
== Name and alias ==
Line 32: Line 26:


== WannaCry Ransomware ==
== WannaCry Ransomware ==
Over 200,000 machines were infected with tools from this leak within the first two weeks, and in May 2017, the major WannaCry ransomware attack used the ETERNALBLUE exploit on Server Message Block (SMB) to spread itself.
Over 200,000 machines were infected with tools from this leak within the first two weeks,[31] and in May 2017, the major WannaCry ransomware attack used the ETERNALBLUE exploit on Server Message Block (SMB) to spread itself.


ETERNALBLUE contains kernel shellcode to load the non-persistent DoublePulsar backdoor.
ETERNALBLUE contains kernel shellcode to load the non-persistent DoublePulsar backdoor.
Line 44: Line 38:
== Windows Critical Update ==
== Windows Critical Update ==
Sometime after that, Microsoft Released a Critical System Update to patch the WannaCry Exploit. Even on Unsupported systems like Windows XP and Windows Vista
Sometime after that, Microsoft Released a Critical System Update to patch the WannaCry Exploit. Even on Unsupported systems like Windows XP and Windows Vista
{{Stub}}
[[Category:Hijackers]]
[[Category:Hijackers]]
[[Category:Internet Related Pages]]
[[Category:Internet Related Pages]]
Line 67: Line 46:
[[Category:Vandals]]
[[Category:Vandals]]
[[Category:Thief]]
[[Category:Thief]]
[[Category:Article stubs]]
Please note that all contributions to Real-Life Villains may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Real-Life Villains:Copyrights for details). Do not submit copyrighted work without permission!
Cancel Editing help (opens in new window)

Templates used on this page:

This page is a member of a hidden category: