DaemonForums  

Go Back   DaemonForums > DaemonForums.org > News

News News regarding BSD and related.

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 7th March 2017
e1-531g e1-531g is offline
VPN Cryptographer
 
Join Date: Mar 2014
Posts: 369
Default CIA's hacking tools and documents were leaked. Wikileaks publishes them.

WikiLeaks publishes docs from what it says is trove of CIA hacking tools
Quote:
This morning, WikiLeaks posted the first of what the organization's spokesperson says is a multi-part series of documents and files from the Central Intelligence Agency. "The first full part of the series, 'Year Zero', comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina [sic]," WikiLeaks' spokesperson said in a press release.

The documents, many of them incomplete or redacted, appear to be pulled in part from an internal Wiki, while others appear to have been part of a user file directory. In a move unusual for WikiLeaks, individuals' names have been redacted and replaced with unique identifiers. "These redactions include tens of thousands of CIA targets and attack machines throughout Latin America, Europe, and the United States," WikiLeaks' spokesperson explained in the release.
__________________
Signature: Furthermore, I consider that systemd must be destroyed.
Based on Latin oratorical phrase
Reply With Quote
  #2   (View Single Post)  
Old 8th March 2017
e1-531g e1-531g is offline
VPN Cryptographer
 
Join Date: Mar 2014
Posts: 369
Default

Some interesting things:
1. Attributing Cyberattacks
Quote:
"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time.
***
2. Hacking cars
http://www.independent.co.uk/life-st...-a7616826.html
Quote:
4) The agency explored hacking into cars and crashing them, allowing 'nearly undetectable assassinations'

Many of the documents reference tools that appear to have dangerous and unknown uses. One file, for instance, shows that the CIA were looking into ways of remotely controlling cars and vans by hacking into them.

"The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations," WikiLeaks notes, in an unproven piece of speculation.
__________________
Signature: Furthermore, I consider that systemd must be destroyed.
Based on Latin oratorical phrase
Reply With Quote
  #3   (View Single Post)  
Old 8th March 2017
gpatrick gpatrick is offline
Package Pilot
 
Join Date: Nov 2009
Posts: 208
Default

Yawn.
Reply With Quote
  #4   (View Single Post)  
Old 8th March 2017
comet--berkeley comet--berkeley is offline
Real Name: Richard
Shell Scout
 
Join Date: Apr 2009
Location: California
Posts: 133
Default

The actual exploits are "unclassified". So everyone in the world is free to use them.

https://wikileaks.org/ciav7p1/

Quote:
How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.
And they relied on "security by obscurity" for protection.

Quote:
Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
Great, my US tax dollars supporting an international malware market.
__________________
When you see a good move, look for a better one.
--Lasker

Last edited by comet--berkeley; 8th March 2017 at 07:53 PM. Reason: changed wording on last comment.
Reply With Quote
  #5   (View Single Post)  
Old 9th March 2017
frcc frcc is offline
Don't Worry Be Happy!
 
Join Date: Jul 2011
Location: hot,dry,dusty,rainy,windy,straight winds, tornado,puts the fear of God in you-Texas
Posts: 122
Default

Is any of this a surprise ?
Reply With Quote
  #6   (View Single Post)  
Old 9th March 2017
e1-531g e1-531g is offline
VPN Cryptographer
 
Join Date: Mar 2014
Posts: 369
Default

Quote:
Originally Posted by frcc View Post
Is any of this a surprise ?
No, but now some things can be stated as facts. Previously they were only an educated guesses.
Anyway it is now determined by public infosec community that most of the exploits are out of date.
__________________
Signature: Furthermore, I consider that systemd must be destroyed.
Based on Latin oratorical phrase
Reply With Quote
  #7   (View Single Post)  
Old 11th March 2017
frcc frcc is offline
Don't Worry Be Happy!
 
Join Date: Jul 2011
Location: hot,dry,dusty,rainy,windy,straight winds, tornado,puts the fear of God in you-Texas
Posts: 122
Default cia exploits

Yes, some facts are known .and, Yes, obviously some code / technique obsolete.
(depending on use and target)

My opinion - this is a cycle in which we find out something at sometime..
Many exploits are unknown "now" because nation states and / or criminal groups have use / need
for them, thus, the cycle resembles the old "spy vrs spy" or if you will "roadrunner vrs Wiley Coyote" cartoons

Last edited by frcc; 11th March 2017 at 02:59 AM. Reason: clarify
Reply With Quote
  #8   (View Single Post)  
Old 11th April 2017
beiroot beiroot is offline
Fdisk Soldier
 
Join Date: Sep 2016
Posts: 64
Default

a little update on a different leakage, the one from NSA

https://blog.malwarebytes.com/cyberc...n-information/
Reply With Quote
Reply

Tags
cia, leaks, state sponsored hacking, wikileaks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Microsoft publishes code of OpenSSH for Windows J65nko News 0 21st October 2015 04:04 PM
Security 1 MILLION accounts leaked in megahack on banks, websites J65nko News 0 28th August 2012 06:29 PM
Security Millions of Last.fm passwords leaked J65nko News 0 8th June 2012 08:42 PM
Security TYPO3 publishes Security Guide for web site owners J65nko News 0 8th December 2011 01:10 PM
WikiLeaks, struggling to make ends meet, begs for donations J65nko News 1 4th February 2010 11:12 PM


All times are GMT. The time now is 12:16 AM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick