Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were discovered on the black market. How could a data breach of this magnitude happen to one of the most secure IT systems in the world? Newly released evidence may provide the answers.

An investigation performed by the FBI points to the source of the hack coming from an individual associated with the NSA, like an employee or a contractor. However, unlike the infamous NSA-employee-turned-fugitive case of Edward Snowden, it looks like this most recent data breach wasn’t an attempt at whistleblowing. Instead, it’s more likely that the breach resulted from the sloppy handling of sensitive files.

Whether the mishandling of the NSA files was an intentional act or not has yet to be determined. Although, what we do know is how they were mishandled. Apparently, the responsible party left the tools on a remote computer during an operation--three years ago! If the tools were removed from the remote PC like they were supposed to be, this whole crisis could have been avoided. To say that this is unfortunate is an understatement, seeing as the stolen tools allow users to exploit systems from Fortinet Inc. and Cisco Systems.

Since the news of the hack became public knowledge, patches for these systems have been released, thus minimizing the damage that can be enacted by hackers using the stolen tools. Although, as is the nature of security patches, organizations that put off installing them will continue to be at risk until they do so, giving hackers ample motivation to seek out and exploit these negligent companies.

Currently, the FBI is looking into the possibility that the employee intentionally left these tools exposed so the Shadow Brokers could obtain them. However, the information thus far points to the employee making an honest mistake, seeing as the worker reported their mistake shortly after making it. Considering then how these events played out, the NSA actually comes out looking bad since they didn’t report the threat to the affected software manufacturers after learning about it; another misstep that could have resolved the problem much sooner.

The takeaway here for business owners is how easy it is for an innocent mistake by you or one of your employees to put your company’s sensitive information at serious risk. Often times, much attention and resources are given to protecting an organization from external threats, like hackers of the Shadow Broker nature, while too little attention is given to training staff on how to properly handle data. When it comes to having an airtight cybersecurity plan, your company must protect itself from every threat, and from every angle.

To make sure your network is fully protected, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 07 May 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Ransomware Workplace Strategy Quick Tips Microsoft Small Business Cybersecurity Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Business Management Android Smartphones Upgrade communications Managed Service Mobile Devices Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Current Events Artificial Intelligence Facebook Productivity Automation Cloud Computing Covid-19 Gadgets Server Managed Service Provider AI Miscellaneous Remote Work Outsourced IT Information Holiday Encryption Employee/Employer Relationship Spam Office Compliance Training Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Apps Two-factor Authentication Chrome Managed Services Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App BYOD Vendor Employer-Employee Relationship Conferencing Avoiding Downtime Marketing How To BDR WiFi Computing Applications Information Technology Access Control Office 365 Hacker IT Support Tip of the week Augmented Reality Retail Storage Website Healthcare Password Bring Your Own Device Managed IT Services Operating System Big Data HIPAA Router Virtual Private Network Risk Management Health Help Desk Analytics Computers Office Tips Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Social Physical Security Display Printer Paperless Office Windows 11 Infrastructure 2FA Customer Service Monitoring Excel Money Saving Time Virtual Machines Professional Services Humor Wireless Technology Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Word Licensing Entertainment Administration Vulnerabilities Data Privacy Images 101 Multi-Factor Authentication Robot Mobility Safety Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Customer Relationship Management Virtual Desktop Holidays Data storage LiFi Data Storage Hacking Smart Technology Supply Chain Outlook Presentation Video Conferencing Machine Learning Managed Services Provider Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Scary Stories Private Cloud Identity Evernote Paperless IP Address Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Fun Co-managed IT Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Financial Data Recovery Browsers Smartwatch Hard Drives Education Connectivity IT Social Engineering Break Fix Scams Domains Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework CES Refrigeration Tablet IoT Communitications Search Dark Web Cables Public Speaking Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Lithium-ion battery Managed IT Customer Resource management FinTech Legal Data Analysis IT solutions Star Wars IT Assessment Entrepreneur How To Microsoft Excel IT Maintenance Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Undo Google Maps Smart Devices Cortana Ransmoware Alt Codes Content Remote Working Wearable Technology Memory Vendors Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Workforce Typing Wasting Time Threats Application Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Meta Managing Costs Amazon IBM Username Point of Sale eCommerce 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Running Cable Tech Support IT Technicians Virtual Machine Environment Media Bitcoin Network Management Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Competition Tactics Development Hotspot Transportation Small Businesses Laptop Websites Mirgation Hypervisor Displays Windows 8 Drones Shopping Nanotechnology Optimization PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Halloween Chatbots Navigation Management PCI DSS User

Blog Archive