The “Shadow Brokers” hacker group has released malware allegedly created by the US National Security Agency (NSA).
The group, which earlier tried to sell the encrypted cache of hacking tools in an online auction, released a password for it via a blog on 8 April.
Some cyber-security experts have said some of the malware is real, but old.
The NSA has not commented on the hacker group or the material that was released over the weekend.
The Shadow Brokers said they had published the password as a “protest” about US President Donald Trump.
The group wanted “America to be great again”, the blog added.
It criticised, among other things, “[Steve] Bannon’s removal from the [National Security Council]” and the “US military strike on Syria”.
A list of alleged NSA hacking targets and the malware allegedly installed at them was also included in the release, according to some cyber-security experts.
‘Not Russia fans’
The Shadow Brokers say they are “not fans of Russia or Putin”, but some experts have suggested the group may have links with the Russian government.
“Russia is quickly responding to the missile attacks on Syria with the release of the dump file password that was previously withheld,” said Jake Williams, chief executive of cyber-security firm Rendition Infosec in a blog.
A similar opinion was shared on Twitter by Dan Gonzales, a senior scientist at the Rand Corporation think tank.
The Shadow Brokers were “probably a front for or infiltrated by #Russia #cyber groups,” he said.
Neither commentator gave any evidence to support such claims. Russian officials have not commented but have strenuously denied involvement in other hacking cases associated with the US.
“If Russia had stolen the hacking tools, it would be senseless to publicise the theft, let alone put them up for sale,” cyber-security expert James Bamford wrote in an article for Reuters news agency.
He suggested that the Shadow Brokers could be an NSA “insider”.