Latest WikiLeaks dump exposes CIA methods to mask malware
Security

Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks.

On Friday, the site dumped the source code to the Marble Framework, a set of anti-forensic tools that WikiLeaks claims the CIA used last year.

The files do appear to show “obfuscation techniques” that can hide CIA-developed malicious coding from detection, said Jake Williams, a security researcher at Rendition InfoSec, who has been examining the files.

Every hacker, from the government-sponsored ones to amateurs, will use their own obfuscation techniques when developing malware, he said.

But thanks to WikiLeaks, some of the CIA’s methods are out in the public. Security researchers will now have a resource to identify whether past malware samples have any ties to the U.S. spy agency, Williams said.

WikiLeaks has said the same. But the site is also drawing another conclusion with the source code: that the CIA can frame other countries for its malware attacks.   

WikiLeaks points to how the CIA anti-forensic tools support other languages such as Chinese, Russian, Korean, Arabic and Farsi. “This would permit a forensic attribution double game,” the site said.

Security researchers, for instance, might misattribute CIA-developed malware to other countries, when noticing it contained certain foreign languages.

But Williams doesn’t buy that conclusion. “That’s ludicrous,” he said. “It’s wholly inaccurate.”

The anti-forensic tools are actually designed to conceal the presence of computer code written in foreign languages, not reveal it, Williams said.

That’s important because the agency was probably targeting computers overseas from Russia or China. To hack those systems, the CIA probably needed to include some Russian or Chinese language in the malware.

“But if you don’t obfuscate that,” Williams said. “Anyone who is looking at your malware will know you are trying to steal their stuff.”

It’s not the first time WikiLeaks has made claims that were later questioned. Security researchers have criticized the site for exaggerating the CIA’s hacking capabilities since WikiLeaks began dumping tools allegedly taken from the agency.  

The CIA hasn’t commented on Friday’s dumped source code. But assuming the files are real, security researchers say they’ll probably disrupt the agency’s spying efforts.

“This is one of the most damaging releases ever done by WikiLeaks,” tweeted Nicholas Weaver, a researcher at the International Computer Science Institute at the University of California Berkeley.

In addition, hackers will be able to learn from the dumped source code to obfuscate their own malware. "Now anyone can create malware that looks like it came from the CIA," Williams said. 

IDG Insider

PREVIOUS ARTICLE

«How Itch.io became an indie PC game haven—and Steam's antithesis

NEXT ARTICLE

Microsoft to sell Galaxy S8 phones pre-loaded with its own apps»
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

Add Your Comment

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?