Microsoft says exploits leaked by Shadow Brokers were addressed by prior patches

This entire saga all started Friday after a hacker group known as the Shadow Brokers released tools created to target Windows PCs and servers, along with presentations and files purporting to detail the agency's methods of carrying out clandestine surveillance.

They "suggest the NSA was targeting the SWIFT banking system of several banks around the world".

The company also said it verified the exploits and discovered that nine were already been addressed by previously issued patches.

In 2013 Al Quds Bank was using servers running Windows 2008 R2, which was vulnerable to exploits used by the NSA, the documents say.

Some of the exploits allegedly used by the NSA relied on vulnerabilities in older and not-supported SKUs (stock-selling units) of Windows Server, according to Matt Suiche, founder of the security firm Comaeio, who named Windows 2003 specifically. That means that concerned customers should be protected if and only if they've kept their software, as well as Windows version, up-to-date. Those using Windows 7 and above should be safe, provided they update the operating system on a timely basis. The group has released stolen information from the NSA before. "However, Windows Insiders who have devices not on this list can still keep these devices on the Windows 10 Creators Update at their own risk knowing that it's unsupported".

An email to the NSA's press office was not returned.

"EastNets continues to guarantee the complete safety and security of its customers' data with the highest levels of protection from its Swift-certified service bureau". "We now have all of the tools the NSA used to compromise SWIFT (via) Cisco firewalls, Windows", he added.

Later on Friday, Microsoft published a blog post in which it revealed that most of the vulnerabilities mentioned in The Shadow Brokers' leak were fixed in a March 14 update.

The release is the latest in a series by Shadow Brokers, and marks the first time the group has published something other than hacking tools. Microsoft appears to have been notified about the problems ahead of the release - security experts suspect the company could have been informed by the Shadow Brokers or by the NSA itself, Ars Technica reported.

The hacking report also contained computer code that could be adapted by criminals to break into SWIFT servers and monitor messaging activity between banks, according to cybersecurity consultant Shane Shook.

Belgium-based SWIFT on Friday downplayed the risk of attacks employing the code released by hackers and said it had no evidence that the main SWIFT network had ever been accessed without authorization.