{"id":10395,"date":"2017-11-09T11:45:07","date_gmt":"2017-11-09T19:45:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/09\/news-4168\/"},"modified":"2017-11-09T11:45:07","modified_gmt":"2017-11-09T19:45:07","slug":"news-4168","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/09\/news-4168\/","title":{"rendered":"WikiLeaks Starts Releasing Source Code For Alleged CIA Spying Tools"},"content":{"rendered":"<p><strong>Credit to Author: Emanuel Maiberg| Date: Thu, 09 Nov 2017 18:58:21 +0000<\/strong><\/p>\n<p> WikiLeaks published <a href=\"https:\/\/wikileaks.org\/vault8\/\" target=\"_blank\">new alleged material<\/a> from the CIA on Thursday, releasing source code from a tool called Hive, which allows its operators to control malware it installed on different devices. WikiLeaks previously released documentation pertaining to the tool, but this is the first time WikiLeaks has released extensive source code for any CIA spying tool. <\/p>\n<p> This release is the first in what WikiLeaks founder Julian Assange says is a new series, Vault 8, that will release the code from the CIA hacking tools revealed as part of Vault 7.<\/p>\n<p>\u201cThis publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components,\u201d WikiLeaks said in its press release for Vault 8. \u201cHive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention.\u201d<\/p>\n<p> <b> Read more: <\/b><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/kzey9e\/jason-katz-wikileaks\" target=\"_blank\"><b> The Man Who Made the Mistake of Trying to Help Wikileaks<\/b><\/a> <\/p>\n<p> In March of this year, WikiLeaks <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/wikileaks-just-dumped-a-cache-of-information-on-alleged-cia-hacking-tools\" target=\"_blank\">revealed that it had obtained a cache of documents and hacking tools allegedly stolen from the CIA<\/a>. The initial release was followed, in classic WikiLeaks style, by periodic new spills of docs and tools. But Assange and his colleagues <a href=\"https:\/\/www.reuters.com\/article\/us-cia-wikileaks-assange\/wikileaks-offers-cia-hacking-tools-to-tech-companies-assange-idUSKBN16G27Y\" target=\"_blank\">decided<\/a> not to publish code that might reveal unpatched bugs or vulnerabilities, so that these could be patched and so that people \u201ccan be secure.\u201d <\/p>\n<p> Instead, WikiLeaks <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/jpna3x\/wikileaks-wont-tell-tech-companies-how-to-patch-cia-zero-days-until-its-demands-are-met\" target=\"_blank\">contacted the affected companies to disclose them, but the negotiations with the companies\u2014at least at the beginning\u2014didn\u2019t go very well<\/a>, as WikiLeaks made demands without sharing information. Later, however, companies such as Cisco <a href=\"https:\/\/threatpost.com\/cisco-patches-ios-xe-vulnerability-leaked-in-vault-7-dump\/125568\/\" target=\"_blank\">reported fixing vulnerabilities<\/a> stemming from the leaks, indicating they either found them on their own or WikiLeaks finally told them. <\/p>\n<div class=\"article__media\"><picture class=\"article__image\"><source media=\"(max-width: 25em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1510253813960-hive.png?resize=400:*, https:\/\/video-images.vice.com\/_uncategorized\/1510253813960-hive.png?resize=600:* 2x\"><source media=\"(max-width: 40.625em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1510253813960-hive.png?resize=650:*, https:\/\/video-images.vice.com\/_uncategorized\/1510253813960-hive.png?resize=975:* 2x\"><source media=\"(min-width: 40.625em)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1510253813960-hive.png?resize=709:*\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/_uncategorized\/1510253813960-hive.png\" alt=\"\"><\/picture>\n<div class=\"article__image-caption\">Image: WikiLeaks<\/div>\n<\/div>\n<p> Jake Williams, a former NSA hacker who now works at the security firm Rendition InfoSec, said that the code WikiLeaks released on Thursday doesn\u2019t seem that dangerous, because it will just \u201chelp forensics professionals and cause CIA to refactor code, but nothing that will enable a cyberattack.\u201d <\/p>\n<p> But, he added \u201creleasing code for other tools described in Vault 7 could give attackers the ability to exploit and implant new machines.\u201d <\/p>\n<p> \u201cFor instance, the code for <a href=\"https:\/\/wikileaks.org\/vault7\/#Pandemic\" target=\"_blank\">Pandemic<\/a> and <a href=\"https:\/\/wikileaks.org\/vault7\/#Brutal%20Kangaroo\" target=\"_blank\">Brutal Kangaroo<\/a> tools could be a game changer,\u201d Williams told me via Twitter direct message, referring to CIA tools that are used create persistent implants on Windows machines and to target closed Windows networks. \u201cThere&#8217;s still a possibility that an unpatched <a href=\"https:\/\/docs.google.com\/document\/d\/1gWE2eTQkFFK9flQmR4dhEeb2u5pWtLtdWaDxbn3nTv8\/edit\" target=\"_blank\">zero-day<\/a> exists for USB infection as described in the Brutal Kangaroo documents.\u201d<\/p>\n<p> In its release, WikiLeaks said that materials published as part of Vault 8 will &#8220;not contain zero-days or similar security vulnerabilities which could be repurposed by others.&#8221;<\/p>\n<p> Martijn Grooten, an editor at Virus Bulletin, agreed with Williams, <a href=\"https:\/\/twitter.com\/martijn_grooten\/status\/928671394531102720\" target=\"_blank\">saying<\/a> that the data leaked on Thursday likely is not that useful for criminals, \u201cnot more than an average advanced malware analysis (or a DEF CON) talk is useful to them,\u201d he said <\/p>\n<p> WikiLeaks did not respond to a request for comment. <\/p>\n<p> When reached for comment, the CIA referred me to its March 8 statement, where the spy agency said that it had \u201cno comment on the authenticity of purported intelligence documents released by Wikileaks.\u201d<\/p>\n<p> <b> <i> Get six of our favorite Motherboard stories every day <\/i><\/b><a href=\"http:\/\/motherboard.club\/\" target=\"_blank\"><b> <i> by signing up for our newsletter.<\/i><\/b><\/a><\/p>\n<p><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/qv3xxm\/wikileaks-vault-7-vault-8-cia-source-code\" target=\"bwo\" >https:\/\/motherboard.vice.com\/en_us\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/5a04a45048581d0bd84f84d4\/lede\/1510253709329-vault8.jpeg\"\/><\/p>\n<p><strong>Credit to Author: Emanuel Maiberg| Date: Thu, 09 Nov 2017 18:58:21 +0000<\/strong><\/p>\n<p>The secret-spilling organization launches a new series where it will release the source code of alleged CIA tools from the Vault 7 series. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,13328,10378],"tags":[4500,3919,10573,3764,32,4053,9581,11554,6722],"class_list":["post-10395","post","type-post","status-publish","format-standard","hentry","category-independent","category-motherboard","category-security","tag-cybersecurity","tag-hacking","tag-infosec","tag-malware","tag-news","tag-surveillance","tag-tech-news","tag-vault-7","tag-wikileaks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10395"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10395\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}