{"id":32312,"date":"2017-06-26T12:43:12","date_gmt":"2017-06-26T16:43:12","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/how-the-cia-hacks-computers-that-arent-even-connected-to-the-internet-bgr.php"},"modified":"2017-06-26T12:43:12","modified_gmt":"2017-06-26T16:43:12","slug":"how-the-cia-hacks-computers-that-arent-even-connected-to-the-internet-bgr","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/how-the-cia-hacks-computers-that-arent-even-connected-to-the-internet-bgr.php","title":{"rendered":"How the CIA hacks computers that aren&#8217;t even connected to the internet &#8211; BGR"},"content":{"rendered":"<p><p>    Air-gapped computers are supposed to be ultra-secure PCs that    cant be infected with malware that spreads with the help of    the internet. Thats because of these computers, often    connected to sensitive machines, arent also connected to the    internet. Youd think these systems would be impenetrable by    remote attacks and would require a hacker to be in the same    room with the PC. But, unsurprisingly, the CIA developed tools    that can infect air-gapped computers.  <\/p>\n<p>    Wikileaks on Thursday published more than 150 pages of    materials that explain how the CIA used USB drives to sneak    malware to the air-gapped machines. After all, even these    computers need to exchange data, and the only way to do it is    using USB drives or external hard drives.  <\/p>\n<p>    A platform called Brutal Kangaroo contains tools that can be    used to target computer systems not connected to the internet,    Ars Technica    explains. Drifting Deadline is a tool installed on a    computer of interest. When a USB drive is connected to it, the    tool will infect it with malware that would then be passed to    the air-gapped computer.  <\/p>\n<p>    These advanced malware versions would be able to infect    air-gapped computer immediately after the USB drive is plugged    in. Some of them required no user interaction and could be    activated by default behaviors in Windows, such as Windows    Explorer displaying icons, or the letter corresponding to the    thumb drive that was just inserted.  <\/p>\n<p>    Microsoft said it patched some of these vulnerabilities, and    they dont work on any of the supported versions of Windows.  <\/p>\n<p>    The documentation says that the first infection  the    deployment of Drifting Deadline  might need manual access to a    computer, but Ars argues that intrepid hackers could    find ways to deliver the malware to the computer that would be    used to transmit it to a USB stick.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/bgr.com\/2017\/06\/25\/cia-malware-wikileaks-report\/\" title=\"How the CIA hacks computers that aren't even connected to the internet - BGR\">How the CIA hacks computers that aren't even connected to the internet - BGR<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Air-gapped computers are supposed to be ultra-secure PCs that cant be infected with malware that spreads with the help of the internet. Thats because of these computers, often connected to sensitive machines, arent also connected to the internet. Youd think these systems would be impenetrable by remote attacks and would require a hacker to be in the same room with the PC. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32312","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32312"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32312"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32312\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}