News, Security

WikiLeaks says, CIA disguised its hacking activities

WikiLeaks has recently released files that allegedly show how the CIA masked its malware attacks.

The site released the source code to the Marble Framework, a set of anti-forensic tools that WikiLeaks claims the CIA used last year.cia

The files do appear to show “obfuscation techniques” that can hide CIA-developed malicious coding from detection, said Jake Williams, a security researcher at Rendition InfoSec, who has been examining the files.

Every hacker, from the government-sponsored ones to amateurs, will use their own obfuscation techniques when developing malware, he said.

But thanks to WikiLeaks, some of the CIA’s methods are out in the public. Security researchers will now have a resource to identify whether past malware samples have any ties to the US spy agency, Williams said.

WikiLeaks has said the same. But the site is also drawing another conclusion with the source code: that the CIA can frame other countries for its malware attacks.

WikiLeaks points to how the CIA anti-forensic tools support other languages such as Chinese, Russian, Korean, Arabic and Farsi. “This would permit a forensic attribution double game,” the site said.

Security researchers, for instance, might misattribute CIA-developed malware to other countries, when noticing it contained certain foreign languages.

But Williams doesn’t buy that conclusion. “That’s ludicrous,” he said. “It’s wholly inaccurate.”

The anti-forensic tools are actually designed to conceal the presence of computer code written in foreign languages, not reveal it, Williams said.

That’s important because the agency was probably targeting computers overseas from Russia or China. To hack those systems, the CIA probably needed to include some Russian or Chinese language in the malware.

“But if you don’t obfuscate that,” Williams said. “Anyone who is looking at your malware will know you are trying to steal their stuff.”

It’s not the first time WikiLeaks has made claims that were later questioned. Security researchers have criticised the site for exaggerating the CIA’s hacking capabilities since WikiLeaks began dumping tools allegedly taken from the agency.

The CIA hasn’t commented on Friday’s dumped source code. But assuming the files are real, security researchers say they’ll probably disrupt the agency’s spying efforts.

“This is one of the most damaging releases ever done by WikiLeaks,” tweeted Nicholas Weaver, a researcher at the International Computer Science Institute at the University of California Berkeley.

In addition, hackers will be able to learn from the dumped source code to obfuscate their own malware. “Now anyone can create malware that looks like it came from the CIA,” Williams said.

 

Originally published on IDG News Service. Reprinted with permission from IDG.net. Story copyright 2024 International Data Group. All rights reserved.
Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines