Julian Assange Answers “Why Can’t CIA Hacking Operations Be Effectively Regulated?”

The CIA operates in secret using arcane complex technology, which it is incapable of keeping control of because there is nothing to stop CIA officers or contractors making use of it for their own purposes. The technology is designed to be unaccountable and untraceable. Furthermore, projects such as Umbrage actually collect malware from other intelligence agencies and cyber mafia. One antivirus expert has come forward to say that malware that he thought came from China or Iran can now be clearly attributed to the CIA but this is not to say that another power hadn’t stolen it and used it themselves.


 



 


Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.


“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.


CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.


CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.


UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.


This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.


The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.


With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.


UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 •  0 comments  •  flag
Share on Twitter
Published on March 11, 2017 01:54
No comments have been added yet.


Simon Harris's Blog

Simon  Harris
Simon Harris isn't a Goodreads Author (yet), but they do have a blog, so here are some recent posts imported from their feed.
Follow Simon  Harris's blog with rss.