Monday, April 03, 2017

WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations

WikiLeaks’ latest disclosure of CIA cyber-tools reveals a technique used by the agency to hide its digital tracks, potentially blowing the cover on current and past hacking operations aimed at gathering intelligence on terrorists and other foreign targets.

The release Friday of the CIA’s “Marble Framework” comes less than a month after the WikiLeaks dumped onto the Internet a trove of files — dubbed “Vault 7” — that described the type of malware and methods the CIA uses to gain access to targets’ phones, computers and other electronic devices.

“This appears to be one of the most technically damaging leaks ever done by WikiLeaks, as it seems designed to directly disrupt ongoing CIA operations and attribute previous operations,” said Nicholas Weaver, a computer security researcher at the University of California at Berkeley.

The material includes the secret source code of an “obfuscation” technique used by the CIA so its malware can evade detection by anti-virus systems. The technique is used by all professional hackers, whether they work for the National Security Agency, Moscow’s FSB security agency or the Chinese military. But because the code contains a specific algorithm — a digital fingerprint of sorts — it can now be used to identify CIA hacking operations that had previously been detected but not attributed.

“It’s one thing to say, ‘I got hacked.’ It’s another thing to say, ‘I got hacked by the CIA,’ ” said Jake Williams, founder of Rendition InfoSec, a cybersecurity firm. “I suspect this could cause some foreign policy issues down the road.”- Read More

0 Comments:

Post a Comment

<< Home