NSA's powerful Windows hacking tools leaked online

He said the malicious code published on Friday appeared to exploit previously undiscovered weaknesses in older versions of its Windows operating system - the mark of a sophisticated actor and a potential worry for many of Windows' hundreds of millions of users.

The Shadow Brokers, a group of anonymous hackers had published hacking tools used by the NSA a year ago.

On Friday, a group released documents and files indicating NSA had accessed the SWIFT money-transfer system.

"This may well be the most damaging dump against the NSA to date, and it is without question the most damaging post-Snowden release", Weaver wrote.

He added that NSA "completely hacked" EastNets, one of two SWIFT service bureaus named in the documents that were released by the Shadow Brokers.

The NSA could not immediately be reached for comment.

Shadow Brokers first surfaced a year ago offering for sale a suite of hacking tools from the NSA.

Microsoft explains that it fixed the above Shadow Brokers leaked exploits using the corresponding solution. This would normally mean either that Microsoft somehow found (or purchased) all the vulnerabilities The Shadow Brokers were auctioning off, or perhaps that someone anonymously alerted Microsoft about the bugs. The severity of the hacking software exposed was described by experts as an emergency for Microsoft because they consisted of a variety of zero-day, or newly discovered, exploits that can serve to infiltrate Windows machines for espionage, vandalism or document theft.

More news: Shaqiri's stunning goal ends losing streak for Stoke

An SMB exploit that we know very little of, but Microsoft says it patched this back in 2009 via MS09-050.

The exact timing of when software companies get apprised of vulnerabilities is an important concern because of what it says about the effectiveness of the U.S. Vulnerability Equities Process (VEP). One collection of 15 exploits contains at least four Windows hacks that researches have already been able to replicate.

The problem, even if you run Windows 10, is that everybody from the corner store to your credit-card processor may not be.

"We have no evidence to suggest that there has ever been any unauthorized access to our network or messaging services".

Microsoft said three exploits don't reproduce on "supported platforms", meaning people should upgrade to Windows 7 or a newer version.

Some security experts have recommended users to go offline during the weekend or until a patch is released, but Microsoft has stated that all you have to do is make sure that your computer is fully updated, no matter the Windows version. Then, there is EternalSynergy, a remote SMB exploit for Windows 8 and Server 2012. Microsoft didn't elaborate, and only said "Addressed prior to the release of Windows Vista".

A Microsoft spokesman declared for ZDNet that "We are reviewing the report and will take the necessary actions to protect our customers".