Skip to main content

Hacking group says list features servers infiltrated by National Security Agency

The Shadow Brokers, a hacking group that allegedly hacked the NSA and leaked details on its hacking tools a few months ago, is back with more new data. This time it claims to have information on what organizations and systems the intelligence agency targeted and infiltrated.

In a new a blog post titled Trick or Treat?, and signed with the familiar encryption key from last time, the shadowy group claims to show a list of servers that have been hacked by the NSA, or more specifically Equation Group, a supposed NSA-affiliated group.

Recommended Videos

The list features 352 different IP addresses and 306 domain names, including many domains with .edu and .gov, suggesting universities and government agencies, along with a number of mail operators. The servers are spread across 49 countries including China (at the top of the list), India, Germany, Korea, Russia, and Japan among many others. Timestamps show that these servers were hacked between August 2000 and August 2010.

Also on the list are what appear to be names of hacking tools and operations such as “jackladder,” “incision,” and “sidetrack,” as well as on what servers there were used.

The Shadow Brokers’ blog post features some broken English about the U.S. elections and calls to disrupt it — “On November 8th, instead of not voting, maybe be stopping the vote all together?” it reads.

Security experts have met the list with some skepticism, in some cases pointing out that attribution in cyberattacks is always difficult, and that not all of these servers may have actually been attacked by the NSA.

“The Shadow Brokers continue to grapple for publicity and money. The list of servers is 9 years old, likely no longer exist or reinstalled,” said Kevin Beaumont, a security researcher, on Twitter. The group previously attempted to sell supposed NSA data for $600 million during the summer but found no takers.

My Hacker House, in its analysis, still advises caution to anyone who finds a familiar-looking server from their organization on the list and urges them to seek security help. “You may have inadvertently been hosting Equation Group APT cyberattacks from your environment.”

Jonathan Keane
Former Digital Trends Contributor
Jonathan is a freelance technology journalist living in Dublin, Ireland. He's previously written for publications and sites…
Best of Computex 2025 awards: The tech that impressed us the most
Best of Computex 2025

Although Computex 2025 is still far from over, the biggest announcements have already been dropped, and this year's event turned out to be quite exciting. From graphics cards to laptops and monitors, there's plenty of options for a tech enthusiast to dig into, and some -- if not most -- of these new innovations are already available, or will be soon.

Out of all the thrilling new tech that companies such as AMD, Asus, Acer, and MSI announced, what impressed us the most? Below, you'll find the new releases that scored our Best of Computex 2025 award.

Read more
Google IO 2025 summary: 5 big announcements you’ll want to know
Google IO 2025 logo on the surface of the earth

Google IO 2025 delivered us a huge helping of AI during the almost two-hour opening keynote.

Google's CEO, Sundar Pichai, and colleagues got through an awful lot on stage, and while some of the talk was aimed primarily at developers, there were plenty of big announcements for us - the people on the street - to explore.

Read more
How to keep your Apple devices safe from AirPlay attacks
Apple AirPlay streaming to another device.

Apple’s approach to building new features has always been rooted in safety and seamless convenience. Take, for example, AirPlay, a wireless standard created by the company that allows users to stream audio and video from one device to another.

AirPlay works not just across Apple devices, but also on TVs and speakers cleared by the company to offer the wireless streaming facility. That also makes it a ripe target for attacks, and it seems there are, in fact, vulnerabilities in the wireless lanes that could allow bad actors to seed malware and infect more connected devices. 

Read more