According to experts, the leaks, published by the Shadow Brokers on Friday, targeted a variety of Windows servers and Windows operating systems, including Windows 7 and Windows 8, CNN reported.
Although some records bear NSA seals, their authenticity has yet to be confirmed. The group complained about the lack of media coverage of its release last Saturday. In January of this year, the group announced another auction for Windows exploits.
While EastNets vehemently denied it was breached just hours after the dump, Microsoft took a more proper approach and said it was reviewing and testing the exploits.
It's now feared that one of the world's most secure methods of making payment orders has been irrevocably compromised with the NSA's sophisticated arsenal of hacking tools now freely available online.
The exploits released by the Shadow Brokers were compiled executables, able to be used with little technical skills and knowledge.
On Friday, a group calling itself the Shadow Brokers released documents and files indicating NSA had accessed the SWIFT money-transfer system through service providers in the Middle East and Latin America.
Given that Microsoft seemed to miraculously fix the hitherto unknown bugs just a month prior to their exposure leads any sane onlooker to the conclusion that the USA government must have alerted the company to these problems earlier and on the sly, preempting fallout. "Customers with up-to-date software are already protected", the company was quoted as saying.
A collective of security researchers have analyzed the leaked exploits yesterday afternoon, which helped us put a list of all the exploits, here.
"None reproduces on supported platforms, which means that customers running Windows 7 and more recent versions of Windows or Exchange 2010 and newer versions of Exchange are not at risk", Microsoft wrote.
Microsoft's blog post implied that three of the 12 purported NSA tools that were leaked still represent effective attack venues for Microsoft's unsupported Windows products.
Security researchers are now exploring the files trying to determine the capabilities of the alleged exploits, already dubbed by Edward Snowden the NSA's "Top Secret arsenal of digital weapons". Belgium-based SWIFT on Friday downplayed the risk of attacks employing the code released by hackers and said it had no evidence that the main SWIFT network had ever been accessed without authorization.
"There is no impact on SWIFT's infrastructure or data, however we understand that communications between these service bureaus and their customers may previously have been accessed by unauthorized third parties". "Other than reporters, no individual or organization has contacted us in relation to the materials released by Shadow Brokers", says a Microsoft spokesperson in a statement to Reuters.