About Our People Legal Stuff Careers
NSA HQ.jpg
FILE - In his June 6, 2013 file photo, the National Security Agency (NSA) campus in Fort Meade, Md. (AP Photo/Patrick Semansky, File)

NSA 'keys to the kingdom' software tools were posted for any hacker to use


Without a doubt, they're the keys to the kingdom.
Former NSA hacker, to The Washington Post

Don't laugh if you see "Epicbanana" or "Egregiousblunder" floating around.

Those are apparently the names of some of the NSA's most powerful hacking tools, and their code was posted online this weekend.

Former NSA workers confirmed to The Washington Post the programs were legitimate.

Tailored Access Operations

The NSA's hacking division, known as Tailored Access Operations, uses these programs to take over firewalls from Cisco and Fortinet servers used by huge corporations and governments.

In other words, this is bigger than just another release of credit card information.

The code was posted by a group calling itself the Shadow Brokers, which claimed if it raised 1 million bitcoins (about $500 million) in an auction, it would release more files.

The Shadow Broker name apparently references the video game series "Mass Effect."

NSA 'keys to the kingdom' software tools were posted for any hacker to use

WATCH: On Monday, Wikileaks founder Julian Assange told CNN "everyone is hacked."

Edward Snowden broke down the significance of the hack in a tweetstorm.

It's a long rant. Here are the highlights.

Here's more on the DNC hack he's referring to. And here's more on its fallout.

How worried are you about the NSA hack?

Trump says racial healing starts with respecting cops, urges UN to step up its game

WATCH: For more news of the day, check out our 60 Second Circa

Read Comments
Facebook Twitter Instagram Pinterest Linked In List Menu Enlarge Gallery Info Menu Close Angle Down Angle Up Angle Left Angle Right Grid Grid Play Align Left Search Youtube Mail Mail Angle Down Bookmark