Skip to main content

CIA hacking tools revealed

WikiLeaks

Part 9 - Examples

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

UMBRAGE

The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

***

Source and links:


[1] [2] [3] [4] [5] [6] [7] [8]

Comments

Popular posts from this blog

Trump's tariffs: A unique opportunity for BRICS and the Global South to fully escape from dollar tyranny

globinfo freexchange   Does Trump know what he is doing? Well, yes and no. While many interpretate his latest move, mostly as an attempt to halt China, his main goal is to give the final blow to the neoliberal order on behalf of his oligarchs .  From this perspective, Trump's unprecedented decision to decide mass tariffs against almost everyone, was an act of strategic hit against the global free market neoliberalism, with the financial capital  at its top. And that's because this dominant-for-almost-half-century system, identifies restrictions and protectionism as major threats against its own existence. In other words, Trump acted as a commander of the capitalist faction that wants to beat its neoliberal rivals and put itself in charge, through a new transformation of capitalism into a 21st century corporate feudalism.   Concerning China, Trump's move may have some negative impact on its economy for a while, since China has chosen to partially play by the rule...

Deranged euroclowns want to revive a nazi-origin project!

globinfo freexchange   Behind the ridiculously cartoonish latest spot of the EU that gives "instructions" to the European citizens on how to deal with a major crisis during the first hours, lies a secret desire.    The deranged euroclowns of the crypto-fascist extreme center , are trying to build up a condition of consent inside the minds of Europeans, which is related to their biggest wet dream: an autonomous imperialist European army. The idea was not born suddenly because of Trump's hostile attitude against his own allies. From the early 50s, pan-European networks of neo-Nazis were created. In May 1951, the European Social Movement (MSE) was founded in Malmö, Sweden. Essentially, it was about projecting the ideology of the German SRP on a pan-European level. The MSE, which would remain active until the 1980s, proclaimed the need for Europe to emancipate itself from the divisive tutelage of the USA and the USSR, called for the defense of the “European race” against th...

Neoliberalism Needs To Go

Second Thought  

Netanyahu BRAGS About Genocide - And Our Media COVERS IT UP

Owen Jones  

Google Imports Ex Israeli Spies, The Genocide Resumes, Cruel Britannia

by Nate Bear   Part 3 - Cruel Britannia   The UK is moving ahead with large welfare cuts for disabled people, including those with cancer. On TV the other day, the UK’s health secretary Wes Streeting said that people with cancer should be in work, not at home resting. Alongside this, the government has said that to cut youth employment it will push young people to join the army. This, of course, is in the context of a massive expenditure on military weapons in the face of the Russian bogeyman.   What’s happening in the UK under a nominally centre-left Labour government is a good reminder that there is never a lesser evil if your leaders are neoliberals. Balancing the books on the backs of the poorest and most vulnerable in society is the north star of all neoliberals, whether they call themselves centrists, left wing or right wing. Cruelty is the policy and the point.    Yet the last few years have also been a good reminder that everything is a choice. Cov...

Trump Speeds Up FALL OF THE WEST With Tariff War

Owen Jones     Related:   Trump's tariffs: A unique opportunity for BRICS and the Global South to fully escape from dollar tyranny

UN rapporteur Francesca Albanese: World is watching a live genocide in Gaza and doing nothing

The New Arab   As Israel’s war on Gaza enters its 19th month, UN Special Rapporteur Francesca Albanese is sounding the alarm louder than ever: the world is watching a live genocide — and doing nothing to stop it. In an exclusive interview with The New Arab , Albanese describes the devastation in Gaza as unparalleled since WWII. Entire neighbourhoods lie in ruins, tens of thousands are dead, and 91% of Gaza’s population is at risk of malnutrition. Over 60,000 children show signs of cognitive impairment due to starvation.  “This is not just war. This is genocide in real time,” she says. “What we are seeing now is the destruction of a people who refuse to leave.” Despite UN mandates and international law, Albanese says the global system is paralysed, and governments, corporations, and even universities are complicit. “If Palestine were a crime scene, it would bear all our fingerprints.”

US Official EXPOSES Truth About Gaza From The Inside

Owen Jones  

Google Imports Ex Israeli Spies, The Genocide Resumes, Cruel Britannia

by Nate Bear   Part 2 - The genocide resumes   The day before the Wiz deal, Israel resumed its genocide of Gaza with an unhinged bloodthirsty rampage, the deadliest twenty-four hours in the last nearly eighteen months of genocide. A high bar had been set, and it was cleared. They attacked at night, itself an act of utter cowardice and sadism, and slaughtered hundreds as they slept in tents. In tents. Close to one hundred babies and young children were killed. The overall death toll exceeds 400 and is rising. As expected, there is not a flicker of condemnation from world leaders, many of whom are arming Israel with the weapons and intelligence it needs for genocide. The British air force spent the ceasefire period gathering intelligence on Palestinians and feeding it to Israel so they could restart the mass murder efficiently.  The genocide is the end of the west. It destroys any claim to moral superiority over Russia, China, Iran or any of the officially designated bad g...