Vault 7 :
It is the series of leaks released by wikileaks the disclosurer on U.S. central intelligence,
largest ever disclosure of confidential documents on a agency.
The day on which is CIA lost control over its hacking arsenal which includes malware, trojan, virues is referred to 'Zero Day' by wikileaks. The archive is very usefull who knows to use it and can give him full hacking capability of CIA.
CIA has been building not only capable spys, agents but also a fleet of hackers which seem to be everywhere in world.The agency has given no response to these leaks as it may indicate the controversial hacking arsenal of NSA.
VAULT 7 : part one CIA hacking tools
CIA hacking tools are developed by EDG (engineering development group) , a software developmet group within CIA.
There was attack against Samsung smart tv with cooperation of MI5 , the infestation was known as weeping angels, it targets tv to put it in a Fake-off mode so that owner falsely believes that its off, but in Fake-off mode the tv acts like bug recording conversation and send it through internet.
CIA malware target windows, OSx, linux:
The major part of documents leaked were about iphones , mac OSx, ios the os on which iphone's run. As it is highly popular between politicians, business, social elites.
The CIA also taken time for Microsoft windows users to infect with its malwares like "Hammer drill"
which infects softwares distributed on CD/DVD's , malwares to hide data in form of image and keep malware infestations going on
Avoid forensics and ant-virus:
All of the CIA malware are designed in such a way that it does not caught by any of cyber-forensics and antivirus like avg, avira, norton, etc, so that it does not leave trail for connection with CIA.
To do that there are Do's and dont's while writing the programme
they use encryption to secure the communication between hackers, data between implants and cache servers.
Malware, trojan, virus Examples by CIA:
HIVE:
HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms.
It provides a platform on a computer , server, on whch customized imlants can perform functions and send there data without awareness of user.
The implants are configured to communicate via HTTPS with the webserver of a cover domain.
UMBRAGE:
CIA not only write the malware but uses other hacker or agency programmes also and use it for their use so that its connection will be form to those cyber criminals or agencies.The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
Improvise (JQJIMPROVISE):
'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.
RickyBobby :
RickyBobby is a lightweight implant for target computers running newer versions of Microsoft Windows and Windows Server. The RickyBobby implant enables COG operators to upload and download files and execute commands and executables on the target computer without detection as malicious software by personal security products (PSPs).
'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.
RickyBobby :
RickyBobby is a lightweight implant for target computers running newer versions of Microsoft Windows and Windows Server. The RickyBobby implant enables COG operators to upload and download files and execute commands and executables on the target computer without detection as malicious software by personal security products (PSPs).
FLASH BANG:
Flash Bang is a tool designed to beable to migrate from a browser process (using sandbox breakout), escalate privileges, and memory load a NOD Persistence Spec dll.
reference: wikileaks.org

Comments
Post a Comment