{"id":31725,"date":"2017-04-08T16:53:50","date_gmt":"2017-04-08T20:53:50","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-shows-cia-hijacked-russian-mafia-malware-trunews.php"},"modified":"2017-04-08T16:53:50","modified_gmt":"2017-04-08T20:53:50","slug":"wikileaks-shows-cia-hijacked-russian-mafia-malware-trunews","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-shows-cia-hijacked-russian-mafia-malware-trunews.php","title":{"rendered":"WikiLeaks shows CIA hijacked Russian mafia malware &#8211; TRUNEWS"},"content":{"rendered":"<p><p>    On Friday WikiLeaks released part 4 of their Vault 7    series detailing Russian mafia malware believed to have been    weaponized by the CIA  <\/p>\n<p>    (WASHINGTON, DC) WikiLeaks has released the fourth part of    their Vault 7 CIA series.  <\/p>\n<p>    The package set free to the world today is pointedly named    Grasshopper, and details alleged CIA hacking techniques    involving malicious software WikiLeaks claims was taken from    suspected Russian organized crime.  <\/p>\n<p>    The latest release consists of 27 documents WikiLeaks claims    come from the CIAs Grasshopper framework, a platform for    building malware for use on Microsoft Windows operating    systems.  <\/p>\n<p>    In a statementfrom WikiLeaks,    Grasshopper was described as providing the CIA with the    ability to build a customized implant which will behave    differently, depending on the security capabilities of a    computer.  <\/p>\n<p>    According to WikiLeaks, Grasshopper performs a    pre-installation survey of the target device, assuring that the    payload will only [be] installed if the target has the right    configuration.\"  <\/p>\n<p>    This allows CIA operators to detect if a target device is    running a specific version of Microsoft Windows or if an    antivirus is running, according to the statement.  <\/p>\n<p>    Grasshopper allows tools to be installed and run on a machine    without detection using PSP avoidance, allowing it to avoid    Personal Security Products such as 'MS Security Essentials',    'Rising', 'Symantec Endpoint' or 'Kaspersky IS'.  <\/p>\n<p>    One of the so-called persistence mechanisms, which allows    malware to avoid detection and remain on a computer system    indefinitely, is known as Stolen Goods.  <\/p>\n<p>    In the WikiLeaks release, it is creditedto Umbrage, a group within    the CIAs Remote Development Branch (RDB) which was linked in    the Year Zero release to collecting stolen    malware and using it to hide its own hacking fingerprints.  <\/p>\n<p>    The components of the Stolen Goods mechanism were taken from a    malware known as Carperb, a suspected Russian organized crime    rootkit,\" alleges WikiLeaks.   <\/p>\n<p>    Stolen Goods targets the boot sequence of a Windows machine,    loading a driver onto the system that allows it to continue    executing code when the boot process is finished.  <\/p>\n<p>    WikiLeaks confirmed that the CIA did not merely copy and paste    the suspected Russian malware but appropriated \"[the]    persistence method, and parts of the installer, which were    then modified to suit the CIAs purposes.  <\/p>\n<p>    The latest release came with an emblem containing a grasshopper    and the words: Look before you leap, a possible reference to    how the latest leaked tools would allow the CIA to prepare a    machine for future hacking, without raising suspicion.  <\/p>\n<p>    The rootkits can be installed and used as a 'man on the inside'    who can allow more malicious software through undetected in    future, if the CIA felt it necessary. If suspicions were raised    on initial installation, they would know not to proceed with a    more extensive operation.  <\/p>\n<p>    Also detailed in the release are Buffalo and Bamboo, modules    that hide malware inside DLLs, a collection of shared    libraries, on a Windows system.  <\/p>\n<p>    The two modules operate in slightly different ways: Buffalo    runs immediately on installation whereas Bamboo requires a    reboot to function properly.  <\/p>\n<p>    The goal of todays release is to help users seeking to defend    their systems against any existing compromised security    systems, Wikileaks stated.  <\/p>\n<p>    Also detailed in the release is ScheduledTask, a component of    Grasshopper that allows it to utilize Windows Task Scheduler    to schedule executables.  <\/p>\n<p>    The component would allow the executables to automatically run    at startup or logon, before killing it at the end of its    duration. Included in ScheduledTask are commands that allow the    executables names and description to be hidden.  <\/p>\n<p>    The release is the fourth in a series called Vault 7 which WikiLeaks claims contains    documents taken from within the CIA. Releases so far include    Zero Days which detailed the CIAs hacking    of Samsung smart TVs and Marble, which allowed the CIA to disguise    their hacks and attribute them to someone else, including    Russia.  <\/p>\n<p>    RT copy, TRUNEWS    contribution  <\/p>\n<p>      Donate Today!    <\/p>\n<p>      We believe Christians need and deserve their own global news      network to keep the worldwide Church informed, and to offer      Christians a positive alternative to the anti-Christian      bigotry of the mainstream news media    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.trunews.com\/article\/wikileaks-shows-cia-hijacked-russian-mafia-malware\" title=\"WikiLeaks shows CIA hijacked Russian mafia malware - TRUNEWS\">WikiLeaks shows CIA hijacked Russian mafia malware - TRUNEWS<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> On Friday WikiLeaks released part 4 of their Vault 7 series detailing Russian mafia malware believed to have been weaponized by the CIA (WASHINGTON, DC) WikiLeaks has released the fourth part of their Vault 7 CIA series. The package set free to the world today is pointedly named Grasshopper, and details alleged CIA hacking techniques involving malicious software WikiLeaks claims was taken from suspected Russian organized crime. The latest release consists of 27 documents WikiLeaks claims come from the CIAs Grasshopper framework, a platform for building malware for use on Microsoft Windows operating systems<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-31725","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31725"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31725"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31725\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}