Skip to main content

CIA hacking tools revealed

WikiLeaks

Part 9 - Examples

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

UMBRAGE

The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

***

Source and links:


[1] [2] [3] [4] [5] [6] [7] [8]

Comments

Popular posts from this blog

Jeremy Corbyn: Gaza, Nuclear War & Why Movements Must Rise Now

Empire Files   Abby Martin sits down with MP Jeremy Corbyn in Bogotá during The Hague Group summit on Gaza. They discuss the limits of electoral politics, the danger of nuclear weapons, the central role of the US and UK in the Gaza genocide, and more.  

How China & Russia help Global South countries defend against US imperialism: Nicaragua explains

Geopolitical Economy Report   China and Russia help formerly colonized countries in the Global South defend their sovereignty amid constant US meddling and aggression, argues Daniel Ortega, President of Nicaragua, a Latin American country that has been invaded and militarily occupied by the USA multiple times. Ben Norton reports on the history of the Sandinista Revolution, and the struggle against Western imperialism.  

New Corbyn Party Could Already TIE With Labour - Bombshell Poll

Owen Jones  

Several states vow to take six 'concrete' steps against Israel at Bogota summit

Colombia says 'we will no longer allow international law to be treated as optional' as nations pledge to prevent arms transfers to Israel for Gaza atrocities   by Laura Gamba in Bogota  A coalition of states from around the world gathering in Bogota on Wednesday agreed to implement six measures to stop Israel's onslaught on Gaza and prevent violations of international law. The announcement came as part of an "emergency summit" in the Colombian capital, co-hosted by the governments of Colombia and South Africa as co-chairs of The Hague Group, to coordinate diplomatic and legal action to counter what they describe as "a climate of impunity" enabled by Israel and its powerful allies. The Hague Group is currently a bloc of eight states, launched on 31 January in the eponymous Dutch city, with the stated goal of holding Israel accountable under international law. The conference brought together more than 30 states, including Algeria; Bolivia; Botswana; Brazil...

Rule by the rich: Western governments are oligarchies, not democracies

Geopolitical Economy Report   Western governments claim to be models of democracy, and demonize their geopolitical adversaries as "authoritarian", but empirical evidence shows that the USA and European countries are oligarchies dominated by economic elites and large corporations. Billionaire Donald Trump is the perfect symbol of this, but he's by no means the only one. Ben Norton explains. 

Israel's DARK SECRET Genocide Economy EXPOSED

Double Down News   The REAL Reason US Sanctioned UN Special Rapporteur Francesca Albanese. 

Media finally admits: Israel is committing genocide in Gaza, as US corporations profit

Geopolitical Economy Report   The New York Times finally admitted Israel is carrying out a genocide against the Palestinian people in Gaza, in an article by an Israeli scholar who studies the Holocaust. A United Nations report detailed how US corporations are profiting from these crimes, although the Trump administration responded by imposing sanctions on the UN expert who exposed it, Francesca Albanese. Ben Norton explains. 

ICC judges reject Israel's request to withdraw Netanyahu arrest warrant

Judges at the International Criminal Court (ICC) on Wednesday rejected Israel's request to withdraw arrest warrants for Prime Minister Benjamin Netanyahu and former Defence Minister Yoav Gallant. Israel made the request while the ICC reviews its challenge over the court's jurisdiction to weigh in on its war on Gaza. The decision, dated 9 July 2025, was published on the ICC website on Wednesday. The judges also rejected an Israeli request to suspend the court's broader investigation into alleged crimes in the occupied Palestinian Territories.   Full report:   https://www.middleeasteye.net/news/icc-judges-reject-israel-request-withdraw-netanyahu-arrest-warrant 

Israel is a terrorist state

🚨⚡️ ISRAELI BOMBING OF SYRIA: Tel Aviv is now striking the heart of Damascus — not just military targets in Suwayda. Syria gave up the Golan. They gave everything. But Israel still bombs them. pic.twitter.com/MO91EdV2t8 — RussiaNews 🇷🇺 (@mog_russEN) July 16, 2025