{"id":32701,"date":"2017-07-26T09:43:44","date_gmt":"2017-07-26T13:43:44","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-releases-documents-provided-to-the-cia-by-raytheon-for-developing-malware-firstpost.php"},"modified":"2017-07-26T09:43:44","modified_gmt":"2017-07-26T13:43:44","slug":"wikileaks-releases-documents-provided-to-the-cia-by-raytheon-for-developing-malware-firstpost","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-releases-documents-provided-to-the-cia-by-raytheon-for-developing-malware-firstpost.php","title":{"rendered":"WikiLeaks releases documents provided to the CIA by Raytheon for developing malware &#8211; Firstpost"},"content":{"rendered":"<p><p>    WikiLeaks has released five documents that private defense    contractorRaytheon Blackbird Technologies provided to the    CIA towards building the UMBRAGE Component Library (UCL).    According to WikiLeaks, Raytheon acted as a technology scout    for the CIA, exploring the malware in the wild, and    recommending promising malware to CIA development teams for use    in their own tools.  <\/p>\n<p>    The documents, a part of the Vault    7 series of releases contains five reports. The first is a    keylogger by the Emissary Panda, a threat actor believed to be    based in China. The actual tool was not that sophisticated, it    managed to persist on the system but used plain text to    communicate with the command and control servers. The second is    also a remote access tool by Samurai Panda, another group    believed to be operating from China. The tool was a variant of    an Adobe Flash exploit used by the Italian group, Hacking Team.  <\/p>\n<p>    The next document outlines the capabilities of a fairly    sophisticated malware known as Regin. Regin has a six stage    architecture, and is modular, allowing for the malware to be    customised for a particular target or operation.    Themalware is customised using the modular payloads for    specific purposes, including file system access, networking    capabilities, compression operations, port blocking, packet    filtering and so on.  <\/p>\n<p>    Another document describes the Gamker Trojan, used for stealing    information. Apparently the Trojan uses unusual instructions in    assembly language, to obfuscate the code.  <\/p>\n<p>    The most sophisticated malware described in this set of    releases is HammerToss, which is suspected to be a Russian    state sponsored malware. The malware uses Twitter accounts,    GitHub or compromised websites, and cloud storage to arrange    the command and control operations for the malware. There is a    five stage architecture for the malware. The malware contains    an algorithm that generates Twitter handles on a daily basis,    that requires the malware to check the Twitter handles for    receiving further instructions.  <\/p>\n<\/p>\n<p>    The instructions are hidden in a URL Tweeted out by the    handles, and the accompanying hashtag provides the information    needed to decode the instructions. The malware then downloads    the data, and uses the hashtag in the tweet to figure out the    instructions. The malware then executes the instructions on the    target machine. If data has to be retrieved, it is stored in    the cloud, from where it is later retrieved by the operators of    the malware.  <\/p>\n<p>    Incorporating malware already in the wild into their own tools    can mask the origin of the malware, allowing the CIA to disguise the source of the    malware from forensic investigation teams. Unlike    many other releases that are part of the Vault 7 disclosures,    the tools revealed in the Raytheon set of leaks are not    developed by the CIA itself. These tools are developed by other    threat actors, that have been identified as malware of    interest, parts of which could be used by the CIA.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.firstpost.com\/tech\/news-analysis\/wikileaks-releases-documents-provided-to-the-cia-by-raytheon-for-developing-malware-3855105.html\" title=\"WikiLeaks releases documents provided to the CIA by Raytheon for developing malware - Firstpost\">WikiLeaks releases documents provided to the CIA by Raytheon for developing malware - Firstpost<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WikiLeaks has released five documents that private defense contractorRaytheon Blackbird Technologies provided to the CIA towards building the UMBRAGE Component Library (UCL). <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32701","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32701"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32701"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32701\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}