[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register] 

Status: Not Logged In; Sign In

More than 100 killed or missing as Sinaloa Cartel war rages in Mexico

New York state reports 1st human case of EEE in nearly a decade

Oktoberfest tightens security after a deadly knife attack in western Germany

Wild Walrus Just Wanted to Take A Summer Vacation Across Europe

[Video] 'Days of democracy are GONE' seethes Neil Oliver as 'JAIL' awaits Brits DARING to speak up

Police robot dodges a bullet, teargasses a man, and pins him to the ground during a standoff in Texas

Julian Assange EXPOSED

Howling mad! Fury as school allows pupil suffering from 'species dysphoria' to identify as a WOLF

"I Thank God": Heroic Woman Saves Arkansas Trooper From Attack By Drunk Illegal Alien

Taxpayers Left In The Dust On Policy For Trans Inmates In Minnesota

Progressive Policy Backfire Turns Liberals Into Gun Owners

PURE EVIL: Israel booby-trapped CHILDRENS TOYS with explosives to kill Lebanese children

These Are The World's Most Reliable Car Brands

Swing State Renters Earn 17% Less Than Needed To Afford A Typical Apartment

Fort Wayne man faces charges for keeping over 10 lbs of fentanyl in Airbnb

🚨 Secret Service Announces EMERGENCY LIVE Trump Assassination Press Conference | LIVE Right Now [Livestream in progress]

More Political Perverts, Kamala's Cringe-fest On Oprah, And A Great Moment For Trump

It's really amazing! Planet chocolate cake eaten by hitting it with a hammer [Slow news day]

Bombshell Drops: Israel Was In On It! w/ Ben Swann

Cash Jordan: NYC Starts Paying Migrants $4,000 Each... To Leave

Shirtless Trump Supporter Puts CNN ‘Reporter’ in Her Place With Awesome Responses

Iraqi Resistance Attacks Two Vital Targets In Israels Haifa

Ex-Border Patrol Chief Says He Was Instructed By Biden-Harris Admin To Hide Terrorist Encounters

Israeli invasion of Lebanon 'will lead to DOOMSDAY' and all-out war,

PragerUMiss Universe Bankrupt after Trans Takeover: Former Judge Weighs In

Longtime Democratic Campaign Operative Quits the Party After What She Saw at the DNC

Dr. Lindsey Doe is teaching people that Pedophilia is a sexual orientation…

Big Mike & Barry Surrender Law Licenses What Are They Hiding?

Covid Vaccines Sharply Raise Risk of Death or Heart Failure, Major New Peer-Reviewed Study Shows

Here Comes Diversity MEME


Science/Tech
See other Science/Tech Articles

Title: Wikileaks Reveals Hive: The CIA’s Top Secret Virus Control System
Source: [None]
URL Source: http://www.mintpressnews.com/wikile ... t-virus-control-system/226864/
Published: Apr 17, 2017
Author: Whitney Webb
Post Date: 2017-04-17 20:26:49 by Ada
Keywords: None
Views: 43

Wikileaks’ latest release comes on the heels of CIA director Mike Pompeo’s aggressive statements against the transparency organization in which he labeled them “non-state hostile intelligence service.”

CIA Director Mike Pompeo speaks at the Center for Strategic and International Studies (CSIS) in Washington, Thursday, April 13, 2017. Pompeo denounced WikiLeaks, calling the anti-secrecy group a "hostile intelligence agency." (AP/Pablo Martinez Monsivais)

CIA Director Mike Pompeo speaks at the Center for Strategic and International Studies (CSIS) in Washington, Thursday, April 13, 2017. Pompeo denounced WikiLeaks, calling the anti-secrecy group a “hostile intelligence agency.” (AP/Pablo Martinez Monsivais)

MINNEAPOLIS – Early Friday morning, Wikileaks released its fifth batch of Vault 7 documents exposing the U.S. Central Intelligence Agency’s hacking techniques. The latest release, titled “Hive,” exposes the agency’s multi-platform malware suite that allows the CIA to monitor targets via malware as well as the ability to realize specific tasks on compromised machines.

Hive is said to provide customizable implants for a variety of operating systems for distinct types of devices, not just computers, tablets, and phones. Among the platforms vulnerable to Hive include Linux, Windows, Solaris, MikroTik (used in Internet routers), and AVTech Network Video Recorders (often used in CCTV recording). First released in 2010, Hive is essentially an “implant” that functions as both a beacon and shell, allowing CIA hackers to gain a foothold in devices that allow them to deploy any number of other tools, such as those detailed in previous releases.

Wikileaks has described Hive’s function as a “back-end infrastructure malware” that uses public HTTPS interfaces which provide “unsuspicious-looking cover domains” to hide its presence on infected devices. Each of those domains is linked to an IP address at a commercial Virtual Private Server (VPS) provider, which forwards all incoming traffic to what is termed a “Blot” server. All re-directed traffic is then examined by CIA hackers to see if it contains a valid beacon. If it does, then a tool handler – called Honeycomb in the released documents – and the CIA then begins initiating other actions on the target computer. The released user guide shows that Hive allows for the uploading and deleting of files as well as the execution of applications on the device.

Advertisment

Unlike some other Vault 7 tools which can persist indefinitely on targeted devices, Hive comes with a “self-delete” function that allows the malware to destroy itself if it receives no signal from the CIA for a set amount of time. The self-deletion leaves only a log and configuration file, containing only a time-stamp behind. Apparently this feature posed difficulties to CIA developers as the self-deletion can “be problematic due to the inability to accurately assess the reliability of the host’s system clock,” according to the Hive Developers Guide.

Wikileaks noted that anti-virus companies along with forensic experts have noticed before that malware, potentially originating from a state-actor, utilized the same back-end infrastructure implantation that Hive employs. Through the analysis of the communication between specific implants, these experts and software companies were able to determine that the malware’s origin came from a “well-resourced organization which was involved in intelligence gathering operations.”

However, there had been unable to attribute the back-end or the implants to the CIA, though Wikileaks’ release of Hive may change that. Indeed, Wikileaks noted in its press release that “The documents from this publication might further enable anti-malware researchers and forensic experts to analyse this kind of communication between malware implants and back-end servers used in previous illegal activities.”

Wikileaks’ latest release comes on the heels of CIA director Mike Pompeo’s aggressive statements against the transparency organization in which he labeled them “non-state hostile intelligence service.” He also condemned Wikileaks’ editor-in-chief, Julian Assange of making “common cause with dictators.” While other CIA directors have targeted both Wikileaks and Assange in the past, Wikileaks now five releases of top secret CIA hacking tools may have prompted an escalation in Pompeo’s rhetoric. It remains to be seen if this rhetoric will translate into action, however.

Assange, for his part, doesn’t seem too concerned, choosing to respond with a witty retort that incisively pointed out the CIA’s lack of credibility in making such accusations:

Be Sociable, Share!

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register]