{"id":32705,"date":"2017-07-26T09:43:58","date_gmt":"2017-07-26T13:43:58","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-drops-another-cache-of-vault7-stolen-tools-naked-security.php"},"modified":"2017-07-26T09:43:58","modified_gmt":"2017-07-26T13:43:58","slug":"wikileaks-drops-another-cache-of-vault7-stolen-tools-naked-security","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-drops-another-cache-of-vault7-stolen-tools-naked-security.php","title":{"rendered":"WikiLeaks drops another cache of &#8216;Vault7&#8217; stolen tools &#8211; Naked Security"},"content":{"rendered":"<p><p>    The WikiLeaks Vault 7 almost-weekly drip-drip-drip    of confidential information on the cybertools and tactics of    the CIA continued last week.  <\/p>\n<p>    The latest document dump is a trove from agency contractor    Raytheon Blackbird Technologies for the so-called UMBRAGE    Component Library (UCL) Project, which includes reports on    five types of malware and their attack vectors.  <\/p>\n<p>    This is the 17th release of specific CIA hacking or    surveillance tools since    the initial announcement by WikiLeaks on March 7.  <\/p>\n<p>    According to a statement announcing the latest release:  <\/p>\n<p>      The documents were submitted to the CIA between November      21st2014 (just two weeks afterRaytheon acquired      Blackbird Technologiesto build aCyber Powerhouse)      and September 11th2015. They mostly contain      Proof-of-Concept ideas and assessments for malware attack      vectors  partly based on public documents from security      researchers and private enterprises in the computer security      field.    <\/p>\n<p>      Raytheon Blackbird Technologiesacted as a kind of      technology scout for theRemote Development Branch      (RDB)of the CIA by analysing malware attacks in the      wild and giving recommendations to the CIA development teams      for further investigation and PoC development for their own      malware projects.    <\/p>\n<p>    The component library includes:  <\/p>\n<p>    A new variant of the HTTPBrowser Remote Access Tool (RAT), used    by a threat actor known as Emissary Panda, believed to be in    China, which was built in 2015. It is a keylogger, and    according to Raytheon captures keystrokes using the    standard RegisterRawInputDevice() and GetRawInput() APIs and    writes the captured keystrokes to a file.  <\/p>\n<p>    A new variant of the NfLog RAT, also known as IsSpace and used    by Samurai Panda. It is, according to Raytheon, a basic RAT    that polls C2 servers every 6 seconds awaiting an encoded    response. If it detects that a user has administrative    privileges, it will attempt to reload itself using the    elevated permissions.  <\/p>\n<p>    Regin, described as a very sophisticated malware sample,    which has been around since 2013. It is used for target    surveillance and data collection. Raytheon said it has a    six-stage, modular architecture that affords a high degree of    flexibility and tailoring of attack capabilities to specific    targets. It is also stealthy, with an, ability to hide itself    from discovery, and portions of the attack are memory resident    only.  <\/p>\n<p>    HammerToss, a suspected Russian state-sponsored malware, which    became operational in 2014 and was discovered in 2015, uses    Twitter accounts, GitHub or compromised websites, and cloud    storage to arrange the command and control operations for the    malware. It is considered the most sophisticated malware of the    five in the current release.  <\/p>\n<p>    Gamker, an information-stealing Trojan that uses an    interesting process for self-code injection that ensures    nothing is written to disk.  <\/p>\n<p>    As WikiLeaks noted in its announcement, these were all malware    attacks found in the wild, and therefore not secret. But the    CIAs hope clearly was that they would lead to development of    their own malware projects  to be used to conduct attacks    not just on individual computers or systems, but social media    platforms like Twitter as well.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"https:\/\/nakedsecurity.sophos.com\/2017\/07\/26\/wikileaks-drops-another-cache-of-vault7-stolen-tools\/\" title=\"WikiLeaks drops another cache of 'Vault7' stolen tools - Naked Security\">WikiLeaks drops another cache of 'Vault7' stolen tools - Naked Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The WikiLeaks Vault 7 almost-weekly drip-drip-drip of confidential information on the cybertools and tactics of the CIA continued last week. The latest document dump is a trove from agency contractor Raytheon Blackbird Technologies for the so-called UMBRAGE Component Library (UCL) Project, which includes reports on five types of malware and their attack vectors. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32705","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32705"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32705"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32705\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}