Malware that WikiLeaks purports belongs to the Central Intelligence Agency has been definitively tied to an advanced hacking operation that has been penetrating governments and private industries around the world for years, researchers from security firm Symantec say.
Malware used by Longhorn bears an uncanny resemblance to tools and methods described in the Vault7 documents. Near-identical matches are found in cryptographic protocols, source-code compiler changes, and techniques for concealing malicious traffic flowing out of infected networks. Symantec, which has been tracking Longhorn since 2014, didn't positively link the group to the CIA, but it has concluded that the malware Longhorn used over a span of years is included in the Vault7 cache of secret hacking manuals that WikiLeaks says belonged to the CIA. Virtually no one is disputing WikiLeaks' contention that the documents belong to the US agency.
"Longhorn has used advanced malware tools and zero-day vulnerabilities to infiltrate a string of targets worldwide," Symantec researchers wrote in a blog post published Monday. "Taken in combination, the tools, techniques, and procedures employed by Longhorn are distinctive and unique to this group, leaving little doubt about its link to Vault7."
Exhibit A in Symantec's case are Vault7 documents describing malware called Fluxwire. The changelog tracking differences from one version to the next match within one to a few days the changes Symantec found in a Longhorn trojan known as Corentry. Early versions of Corentry also show that its developers used the same program database file location specified in the Fluxwire documentation. A change in Fluxwire version 3.5.0 that removes the database file path also matches changes Symantec tracked in Corentry. Up until 2014, Corentry source code was compiled using the GNU Compiler Collection. Then on February 25, 2015, it started using the Microsoft Visual C++ compiler. The progression matches changes described in Vault7 documentation.
Yet more similarities are found in a Vault7 malware module loader called Archangel and a specification for installing those modules known as Fire and Forget. The specification and modules described match almost perfectly with a Longhorn backdoor that Symantec calls Plexor.
Another Vault7 document prescribes the use of inner cryptography within communications already encrypted using the secure sockets layer protocol, performing key exchanges once per connection, and the use of the Advanced Encryption Standard with a 32-bit key. Still other Vault7 documents outline the use of the real-time transport protocol to conceal data sent to command-and-control servers and a variety of similar "tradecraft practices" to keep infections covert. While malware from other groups uses similar techniques, few use exactly the same ones described in the Vault7 documents.
According to Symantec:
While active since at least 2011, with some evidence of activity dating back as far as 2007, Longhorn first came to Symantecs attention in 2014 with the use of a zero-day exploit (CVE-2014-4148) embedded in a Word document to infect a target with Plexor.
The malware had all the hallmarks of a sophisticated cyberespionage group. Aside from access to zero-day exploits, the group had preconfigured Plexor with a proxy address specific to the organization, indicating they had prior knowledge of the target environment.
To date, Symantec has found evidence of Longhorn activities against 40 targets spread across 16 different countries. Symantec has seen Longhorn use four different malware tools against its targets: Corentry, Plexor, Backdoor.Trojan.LH1, and Backdoor.Trojan.LH2.
Before deploying malware to a target, Longhorn will preconfigure it with what appears to be target-specific code words and distinct C&C domains and IP addresses to communicate with. Longhorn uses capitalized code words, internally referenced as groupid and siteid, which may be used to identify campaigns and victims. Over 40 of these identifiers have been observed, and typically follow the theme of movies, characters, food, or music. One example was a nod to the band The Police, with the code words REDLIGHT and ROXANNE used.
Longhorns malware has an extensive list of commands for remote control of the infected computer. Most of the malware can also be customized with additional plugins and modules, some of which have been observed by Symantec.
Longhorns malware appears to be specifically built for espionage-type operations, with detailed system fingerprinting, discovery, and exfiltration capabilities. The malware uses a high degree of operational security, communicating externally at only select times, with upload limits on exfiltrated data, and randomization of communication intervalsall attempts to stay under the radar during intrusions.
For C&C servers, Longhorn typically configures a specific domain and IP address combination per target. The domains appear to be registered by the attackers; however they use privacy services to hide their real identity. The IP addresses are typically owned by legitimate companies offering virtual private server (VPS) or webhosting services. The malware communicates with C&C servers over HTTPS using a custom underlying cryptographic protocol to protect communications from identification.
Prior to WikiLeaks publishing its Vault7 materials, Symantec had regarded Longhorn as a well-resourced organization that engaged in intelligence-gathering operations. Researchers based that assessment on Longhorn's global range of targets and its ability to use well-developed malware and zero-day exploits. Symantec also noted that the group appeared to work a standard Monday-though-Friday work week, based on timestamps and domain name registration dates, behavior which is consistent with state-sponsored groups. Symantec also uncovered indicatorsamong them the code word "scoobysnack"and software compilation timesthat showed Longhorn members spoke English and likely lived in North America.
Since WikiLeaks published its first Vault7 installment in early March, there has been no outside source to either confirm or refute the authenticity of the documents. The Symantec research establishes without a doubt that the malware described in the trove is real and has been used in the wild for at least six years. It also makes a compelling case that the group that's responsible is the CIA.
Read more:
Found in the wild: Vault7 hacking tools WikiLeaks says come from CIA - Ars Technica
- Wikileaks: Pictures, Videos, Breaking News [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks - Official Site [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks diplomatic cable release shows America's undiplomatic side2432 - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Anonymous WikiLeaks - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Anonymous WikiLeaks - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks, drought and Syria [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Wikileaks - Wikileaks [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- TPP Wikileaks Has Released Another Bombshell 17th JAN 2014 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Terabyte Leaks and Political Legitimacy in the U.S. and China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Secret draft of TPP talks on environment show little enforcement measures [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Noam Chomsky on Wikileaks (2013) - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Assange: Wikileaks - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Wikileaks Reveal Secret US Activity in Afghanistan3963 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Wikileaks UFO/USA and Rant - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- ‘Bad Grandpa,’ ‘The Fifth Estate,’ ‘Cloudy’ sequel, ‘Rush’ [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Sam Worthington's Gallipoli drama for the WikiLeaks era [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Film Review | The Fifth Estate [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Freedom Of The Press Foundation Launches To Support WikiLeaks, Increase Transparency - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- FABIO BORGES EXPLICA QUE O É O WIKILEAKS - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- FABIO BORGES FALA SOBRE O WIKILEAKS - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Douglas Murray and Amy Goodman - Wikileaks, Afghanistan, Arab Spring - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- The Fifth Estate [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cumberbatch Opens TIFF With WikiLeaks Drama974 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Julian Assange opens up on Indian Govt's reaction to WikiLeaks - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Reuter Journalisten Zivilisten werden von US Army ermordet Wikileaks - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- June 4 1989 Wikileaks US Cables - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- WikiLeaks: US trying to 'criminalize journalism' over Snowden leaks - Video [Last Updated On: February 7th, 2014] [Originally Added On: February 7th, 2014]
- Rumbatá Beat Band -- Wikileaks (Jaime Rodríguez) (Live @ Bimhuis - Amsterdam) - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Alex Gibney accepts the 2014 Paul Selvin Award for We Steal Secrets: The Story of WikiLeaks - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Security Graph 3D Visualization: WikiLeaks.org - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Russian UFO encounter wikileaks 2014 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- WikiLeaks [Last Updated On: February 16th, 2014] [Originally Added On: February 16th, 2014]
- WIKILEAKS UFO FOOTAGE THAT WAS BANNED. - Video [Last Updated On: February 17th, 2014] [Originally Added On: February 17th, 2014]
- Snowden files show how governments monitor Wikileaks and supporters [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Snowden files show governments monitor Wikileaks and others [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- WikiLeaks now has own search engine [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Spies monitored WikiLeaks visitors in real time, Snowden docs show [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Wikileaks - Soldati americani uccidono innocenti - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Visited WikiLeaks? NSA and GCHQ know about it [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Julian Assange, Wikileaks and Site Visitors Targeted By NSA - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Wikileaks on Lencho Leta (TOP Secret) - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- The Dalai Lama Treasure Chest: New Evidence from Wikileaks - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- BBC WikiLeaks The Secret Life of a Superpower Ep 1 - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- NSA Targeted WikiLeaks, Pressured Foreign Countries to Arrest Julian Assange for Publishing [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- Documents Reveal NSA and GCHQ Efforts to Destroy Assange And Track Wikileaks Supporters - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Glenn Greenwald On Surveillance Of Wikileaks - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- We Steal Secrets, la vérité sur Wikileaks - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- WikiLeaks spied on by the NSA and GCHQ - Truthloader - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Tech News Today 946: WikiLeaks Visitors Tracked - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- 'Paranoid, vain and jealous' - the secret life of WikiLeaks founder Julian Assange [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Wikileaks BBC Scandal, how I faked the winner of Chris Evans 500 Words Short Story Contest 2014 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Julian Assange posed 'no real security threat' to Australia [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- Wikileaks Exposes 9 11 Conspirators - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- [002] Nuclear Plant Whistleblower Fired / Banker Suicides / WikiLeaks Surveillance - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- WikiLeaks Spied On By The NSA And GCHQ - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- wikileaks Drone footage 2013 - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Wikileaks Reveals Saddam And Bush Negotiated Before Kuwait Invasion - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- More Snowden Leaks How The Government Reacted To Wikileaks - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Amazing Wikileaks Video Of Roswell Grey Alien Unbelievable! - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- More Snowden Leaks: How The Government Reacted To Wikileaks - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- 42 David Duke Wikileaks exposes Zionist Treachery - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Wikileaks Nibiru Planet X new evidence 2014 - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- WikiLeaks' Julian Assange Has Cost The Met Police £5.3m During Ecuador Embassy Stay [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- تطوانيون بإفران و النواحي - Video [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- 'This Week' Transcript: WikiLeaks' Julian Assange [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- WikiLeaks UFO Video Analyzed avi - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- WikiLeaks Cables Foreshadow Russian Instigation of Ukrainian Military Action [Last Updated On: March 2nd, 2014] [Originally Added On: March 2nd, 2014]
- Assange Held Back Wikileaks About U S , Israel - Video [Last Updated On: March 2nd, 2014] [Originally Added On: March 2nd, 2014]
- WikiLeaks Cables Reveal Ukraine's Past Cries For Help; Is Kerry's $1 Billion In Aid Too Late? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Flashback: WikiLeaks Cables Show Ukraine Worried About Russian Incursion in 2006 [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Wikileaks. Film dokumentalny - Video [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Assange: Is Obama wearing pants? [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- SXSW: Julian Assange Says Living in Ecuadorian Embassy Is 'Like Prison' [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks founder has harsh words for Google, Facebook [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- 'WikiLeaks' Assange hints at more leaks [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks' Julian Assange talks NSA, hints at more leaks [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks' Julian Assange: NSA critics got lucky because agency had no PR strategy [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Wikileaks' Assange says group will release new secret data [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Afghan journalist Enayat Najafizada on the burden of releasing WikiLeaks documents - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- The Dalai Lama files from Wikileaks - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]