Wikileaks Docs Show How the CIA Allegedly Infected Offline Computers
It seems that more and more information continues to come to light regarding hacking � not
just by your average hacker, but by the CIA and other government agencies, too.
Now, WikiLeaks documents have revealed how the CIA infected offline computers using air-gap
hacking.
Air-gapping refers to a security measure that involves isolating a computer or network and
preventing it from establishing an external connection.
Being segregated in this way, devices cannot connect wirelessly or physically with other
computers or network devices, making them virtually immune to remote hacking.
Classified military networks, the payment networks responsible for processing credit
and debit card transactions for retailers, or industrial control systems that operate
vital infrastructure � these are examples of networks that typically use air-gapping.
Maintaining security requires such networks to remain on internal networks that aren�t
connected to the company�s business network.
This ensures intruders can�t enter the corporate network by way of the Internet and weasel
their way into sensitive systems.
But sometimes, as is being revealed by WikiLeaks, there�s a way around an air-gap. Wikileaks
recently published a series of alleged CIA documents showing how the CIA�s malware
was designed to infect these types of targets.
The exposed documents reveal how the CIA has continued to develop its own hacking tools,
apparently to get into devices such as smart TVs and Internet routers.
Called Brutal Kangaroo, the tool suite�s components consist of various components including:
Drifting Deadline, a thumbdrive infection tool;
Shattered Assurance, a server tool responsible for automated infection of USB drives), Broken
Promise, a post processor that evaluates collected information; and Shadow, the main persistence
mechanism.
�Brutal Kangaroo is a tool suite for targeting closed networks by air gap jumping using thumbdrives,�
one of the documents notes. The 11 files in question come from the CIA�s Engineering
Development Group, and allegedly span from 2012 t0 2016.
According to the documents, the CIA gets around air-gapped computers by first remotely installing
a piece of malware on a system connected to the internet called the �primary host.�
Next, an unaware user plugs the infected USB into an air-gapped computer unavailable to
the CIA. The malware then works to send any data back to the CIA once it�s plugged into
the primary host again.
The project sets up its own �custom covert network� in the air-gapped computers once
the malware has infected a target.
Here, the CIA is given access to files for collection. It can also survey the victim
machines, launch its own executables, delete a predetermined list of files, and more.
As the leak notes, there�s a section of the user guide that reveals problems that
certain antivirus products have against the CIA malware.
For instance, Symantec�s product is said to create a pop-up when the malware tried
to automatically run.
A court filing from earlier this year revealed that the Department of Justice may have mistakenly
confirmed the credibility of the CIA documents.
In February of 2015, the FBI took over Playpen, a dark web child pornography site. During
this time, it utilized a network investigative technique � a piece of malware � to try
to expose the site�s users.
While the investigation resulted in hundreds of arrests, it also generated dozens of court
cases across the U.S. regarding the legality of the warrant used to authorize the hacking
operation, along with the source code of the tool used to hack computers.
Hacking undoubtedly remains a controversial subject, and while it can be useful in exposing
dangers to society, it also raises serious ethical issues about the value and safekeeping
of our privacy.
For more infomation >> Wikileaks Docs Show How the CIA Allegedly Infected Offline - Duration: 5:46.-------------------------------------------
Syed Hashmi Mian On Khwaja Ghareeb Nawaz -Beautiful Waqia - Duration: 2:41.
PLZ SHARE THIS VIDEO TO FRIENDS
LIKE THIS VIDEO
MUST COMMENTS
SUBSCRIBE AS TV
THANKS
-------------------------------------------
THIS HAPPENS IF THE YELLOWSTONE SUPERVOLCANO BLOWS AND -tech and science - Duration: 2:52.
THIS HAPPENS IF THE YELLOWSTONE SUPERVOLCANO BLOWS
AND IT'S TERRIFYING
Yellowstone National Park.
One of the most famous, and albeit highly raved about the national park in the entire
world, it is an attraction that many has claimed that one should at least visit once in their
lives.
The pride of North America, Yellowstone National Park spreads across three states - a testament
to its ginormous land area, the herds and herds of bison, and a unique and peculiar
range of animals and vegetation that live there.
One of the most famous hotspots in the world, with its renowned geysers that have been around
for thousands of years, Yellowstone National Park shows no signs of showing down.
Or is it?
Earthquakes are reported to be a norm at Yellowstone these past few months, sparking fear and concern
about the evil that lies within Yellowstone's vast plains.
That has remained dormant for 70,000 years.
However, the earthquakes show no signs of stopping anytime soon.
Since June 12, they have been frequent and increasingly stronger in magnitude, with a
4.0 magnitude earthquake that happened on 23rd June.
There has been a record of over 400 earthquakes since June 12, causing much worry and fear.
In a press release by scientists from the University of Utah, who have been keeping
track of the changes around Yellowstone, said: �The epicenter of the shock was located
in Yellowstone National Park, eight miles north-northeast of the town of West Yellowstone,
Montana.
The earthquake was reportedly felt in the towns of West Yellowstone and Gardiner, Montana,
in Yellowstone National Park, and elsewhere in the surrounding region.�
However, this fear has been accounted for, though just not shortly - experts at the U.S.
Geological Survey (USGS) has put the odds of the volcano erupting this year at 1 in
730,000.
Though the chances are so slim, natural disasters have taken many experts by surprise an unprecedented
number of times.
Thus measures are still going to be taken to ensure the safety of residents, and the
food supply around the national park.
America is in safe hands of these experts who have devoted their lives to recording
the earthquakes that surround Yellowstone.
One's mind can be put to ease with them around, for sure!
-------------------------------------------
Learn Colors With Motu And Witch For Children | Bad Baby cry Finger Family song - Duration: 2:15.
Learn Colors With Motu And Witch For Children | Bad Baby cry Finger Family song
Không có nhận xét nào:
Đăng nhận xét