

government builds purpose-made digital weapons. The N.S.A.’s tools were most likely more useful than FireEye’s since the U.S. North Korea and Russia ultimately used the N.S.A.’s stolen weaponry in destructive attacks on government agencies, hospitals and the world’s biggest conglomerates - at a cost of more than $10 billion. That group dumped the N.S.A.’s hacking tools online over several months, handing nation-states and hackers the “keys to the digital kingdom,” as one former N.S.A. The hack was the biggest known theft of cybersecurity tools since those of the National Security Agency were purloined in 2016 by a still-unidentified group that calls itself the ShadowBrokers.

#UNDER FIRE HACK UF POINTS REGISTRATION#
At a moment that the nation’s public and private intelligence systems were seeking out breaches of voter registration systems or voting machines, it may have a been a good time for those Russian agencies, which were involved in the 2016 election breaches, to turn their sights on other targets. The hack raises the possibility that Russian intelligence agencies saw an advantage in mounting the attack while American attention - including FireEye’s - was focused on securing the presidential election system. is investigating the incident and preliminary indications show an actor with a high level of sophistication consistent with a nation-state.” Matt Gorham, assistant director of the F.B.I. on Tuesday confirmed that the hack was the work of a state, but it also would not say which one. Most of the tools are based in a digital vault that FireEye closely guards. FireEye uses the tools - with the permission of a client company or government agency - to look for vulnerabilities in their systems. These are essentially digital tools that replicate the most sophisticated hacking tools in the world. has turned the case over to its Russia specialists, left little doubt who the lead suspects were and that they were after what the company calls “Red Team tools.” But its description, and the fact that the F.B.I. The $3.5 billion company, which partly makes a living by identifying the culprits in some of the world’s boldest breaches - its clients have included Sony and Equifax - declined to say explicitly who was responsible.
