Shadow Brokers Exploit Dumping Service Allegedly Nets $90,000
An anonymous researcher has put a dollar amount on the Shadow Brokers’ exploit dumping service — claiming they have made tens of thousands of dollars since they launched it in June. The researcher said he came to this conclusion by tracking Monero transactions, among other things.
Shadow Brokers Subscription Service an Apparent Success
According to the anonymous researcher, the group has made up to US $88,000 between June and early August.
The researcher, who goes by the internet pseudonym “Wh1sk ,” identified several subscribers of the service.
Specifically, Wh1sk was able to was able to find out the email addresses of five people who have subscribed to the Shadow Brokers’ monthly dump service
Allegedly, the researcher was able to do this by decoding the user’s monero payment IDs, which contained their emails.
The actual dollar amount could be lower or higher and does not include Zcash payments, which the group also accepted as a form of payment.
Hacker Group Quietly Chugs Along
Ever since the outbreak of the WannaCry ransomware in May and the Petya malware in June, (both of which originally emerged from earlier Shadow Brokers actions) the group has been mostly flying under-the-radar.
However, the group has recently received some criticism regarding their exploit dumping service.
According to one blogger, going by “fsyourmoms,” the group ripped him off.
Apparently, he had received an old, low-quality tool that “wasn’t close to what theshadow brokers said could be in their subscription service.”
It’s difficult to know what tools subscribers have actually received from the group, if any at all, unless more subscribers come forward to verify.
However, the group itself claims to have a wide range of tools and exploits at their disposal.
In the group’s initial announcement regarding the dumping service, they claimed what they possessed could include anything from browser, router and mobile exploits, to newer exploits for Windows 10 systems. Additionally, claimed to hold compromised network data from SWIFT providers and central banks.
What do you think of the exploit service’s success? Is the success sustainable? Let us know in the comments below.
Images via wccftech and Monero