The ransomware Attack was because of the existing Windows XP systems throughout the world which had been announced unsupported by Microsoft after 2014. "Heck, at this point, Shadow Brokers doesn't even need to have this exploit (though I'm guessing the NSA and Microsoft both may be erring on the side of caution at this point)", she wrote on her site.
This data dump could include exploits and tools for browsers, handsets and routers; new exploits for Windows 10; "compromised network data from more Swift providers and central banks"; and network data stolen from Russian, Chinese, Iranian or North Korean missile/nuclear programs.
Given that the Wannacry attack has already proven the potency of the materials in their possession, it is rather alarming to consider what could be contained in their next set of leaks, especially if they actually have information regarding the nuclear programs of countries.
"TheShadowBrokers is launching new monthly subscription model", it explained.
To bring you up to speed, this hacking group was the first to publicly reveal information of the WannaCry ransomware malware, but it looks like they have another agenda in mind as far as releasing 0-day bugs and exploits go.
There's also the possibility of even more unsafe Shadow Broker releases in the coming months. The threat to release monthly data dumps, like a wine of the month club, starts in June. Each month peoples can be paying membership fee, then getting members only data dump each month.
Jose Mourinho: Manchester United "fight for titles",
It's as simple as that. "The most important thing for us is there were no injuries and some people were having a proper rest". Luck was in United's favour as they are also one step away from making it to the Champions League in the next season.
It also threatened to dump data from banks using the SWIFT global money transfer network and from Russian, Chinese, Iranian or North Korean nuclear and missile programs, without providing further details.
The Shadow Brokers are threatening to make public more of the exploits and tools that they have access to, thanks to the NSA hack. They're now threatening to sell these hacking tools, which are way more risky and lethal.
That attempt was also doomed, and after failing to secure buyers for the remainder of the tools they teased, the group dumped online the August 2016 password-protected archive last month in April. That holding back of exploits, in theory, is the reason why Microsoft's Chief Legal Officer Brad Smith was so mad about WannaCry and the U.S. government stockpiling vulnerabilities.
According to the Shadow Brokers, Microsoft proceeded to cancel February's Patch Tuesday so they could work on the patches the company delivered in March.
Calling themselves the Shadow Brokers, the group first appeared in 2016 claiming that they had access to 75% of the United States cyber arsenal, which they offered to auction to the highest bidder.