# ShadowBrokers are back demanding nearly $4m and offering 2 dumps per month **[securityaffairs.co/wordpress/62770/hacking/shadowbrokers-return.html](http://securityaffairs.co/wordpress/62770/hacking/shadowbrokers-return.html)** September 6, 2017 ## The dreaded hacking group ShadowBrokers posted a new message, promising to deliver two data dumps a month as part its monthly dumps. [The notorious group ShadowBrokers is back with announcing new interesting changes to](http://securityaffairs.co/wordpress/60525/hacking/shadow-brokers-june-dump.html) their [Dump Service.](http://securityaffairs.co/wordpress/59565/uncategorized/shadow-brokers-zero-day-service.html) [The hackers published a new message on the Steemit platform announcing new changed to](https://steemit.com/shadowbrokers/@theshadowbrokers/theshadowbrokers-dump-service-september-2017) their service. “Missing theshadowbrokers? If someone is paying then theshadowbrokers is playing.” The hacker group made headlines in April after publicly leaking exploits allegedly stolen from [the NSA-Linked group Equation Group.](http://securityaffairs.co/wordpress/51879/hacking/shadowbrokers.html) The changes for the Dump Service included 2 dumps per month and the possibility to pay only with [ZCash cryptocurrency:](http://securityaffairs.co/wordpress/54314/cyber-crime/zcash-cybercrime.html) Two dumps per month Zcash only, no Monero, delivery email in encrypted memo field Delivery email address clearnet only, recommend tutanota or protonmail, no need exchange secret, no i2p, no bitmessage, no zeronet Previous dumps now available, send correct amount to correct ZEC address September dumps is being exploit Below the “price list” shared by the group, it includes old dumps and future dumps, from June 30 until November 15. ----- The amount of money requested by ShadowBrokers is substantially increased compared to the initial demand of 100 ZEC (~24k USD) in June, when the hackers started their first monthly dump service. Now, the hackers are offering the exploits for 16,000 ZEC, which amounts to $3,914,080. ShadowBrokers leaked the manual for the NSA exploit dubbed UNITEDRAKE, it is one of [the implants used by the NSA’s elite hacking unit TAO (Tailored Access Operations).](http://securityaffairs.co/wordpress/20819/intelligence/tao-nsa-backdoor-catalog.html) Here's UNITED RAKE (Windows tool) from the Shadow Brokers dump mentioned in a [Snowden document https://t.co/1hQAz2Annd](https://t.co/1hQAz2Annd) [pic.twitter.com/Drljghk9Ka](https://t.co/Drljghk9Ka) [— Joseph Cox (@josephfcox) September 6, 2017](https://twitter.com/josephfcox/status/905338616813150208) According to the leaked manual, UNITEDRAKE implant is a “fully extensible remote collection system designed for Windows targets”. BREAK! [#ShadowBrokers just leaked the manual for #UNITEDRAKE](https://twitter.com/hashtag/ShadowBrokers?src=hash) [https://t.co/SJazaxidXS](https://t.co/SJazaxidXS) — Rickey Gevers (@UID_) [September 6, 2017](https://twitter.com/UID_/status/905347907892781056) Turns out Kaspersky had a post about UNITEDRAKE dated March 11th 2015. They [called UNITEDRAKE EquationDrug. https://t.co/MBw9OI7A6w](https://t.co/MBw9OI7A6w) — Rickey Gevers (@UID_) [September 6, 2017](https://twitter.com/UID_/status/905352188746194944) Files, Signed Message, Manual to August Dump: [https://mega.nz/#F!QGAyVTJL!0cJlvWpQ4dPcKLu-oN766w](https://mega.nz/#F!QGAyVTJL!0cJlvWpQ4dPcKLu-oN766w) ----- Stay Tuned! **Written by:** **[@GranetMan and](https://twitter.com/GranetMan)** **[Pierluigi Paganini](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)** Granet is a young and Junior IT Security Researcher, he is passionate in Linux, Arduino, Digital Forensics, Cyber Security, Free software and Malware Analysis **[Pierluigi Paganini](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)** **[(Security Affairs – ShadowBrokers, hacking)](http://securityaffairs.co/wordpress/)** [CybercrimeEquation groupHackingmalwareMicrosoftNSAShadow brokerswannacry](https://securityaffairs.co/wordpress/tag/cybercrime) ransomware Share On Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved. Back to top [Home](http://securityaffairs.co/wordpress/) [Cyber Crime](https://securityaffairs.co/wordpress/category/cyber-crime) [Cyber warfare](https://securityaffairs.co/wordpress/category/cyber-warfare-2) [APT](https://securityaffairs.co/wordpress/category/apt) [Data Breach](https://securityaffairs.co/wordpress/category/data-breach) [Deep Web](https://securityaffairs.co/wordpress/category/deep-web) [Digital ID](https://securityaffairs.co/wordpress/category/digital-id) [Hacking](https://securityaffairs.co/wordpress/category/hacking) [Hacktivism](https://securityaffairs.co/wordpress/category/hacktivism) [Intelligence](https://securityaffairs.co/wordpress/category/intelligence) [Internet of Things](https://securityaffairs.co/wordpress/category/iot) [Laws and regulations](https://securityaffairs.co/wordpress/category/laws-and-regulations) [Malware](https://securityaffairs.co/wordpress/category/malware) [Mobile](https://securityaffairs.co/wordpress/category/mobile-2) [Reports](https://securityaffairs.co/wordpress/category/reports) [Security](https://securityaffairs.co/wordpress/category/security) [Social Networks](https://securityaffairs.co/wordpress/category/social-networks) [Terrorism](https://securityaffairs.co/wordpress/category/terrorism) ----- [ICS-SCADA](https://securityaffairs.co/wordpress/category/ics-scada) [EXTENDED COOKIE POLICY](https://securityaffairs.co/wordpress/extended-cookie-policy) [Contact me](https://securityaffairs.co/wordpress/contact) -----