CIA developed viruses for hacking Mac and Linux

29 July 2017, 18:06 | Technologies
photo InternetUA
Text Size:

A new data leak reveals the mechanisms of espionage for users of popular software. But, as in previous publications on the CIA hacker program, there are no specific mechanisms for eliminating problems.

Wikileaks published new documents on cyber espionage.

The CIA was particularly interested in hacking the Mac and Linux operating systems as part of its cyber-espionage program Vault 7 (Vault 7). This is evidenced by the data published on Wikileaks concerning the project code-named "Imperial".

The resource claims that the new batch of documents is obtained from an isolated network with a high degree of security inside the Cyber ??Intelligence Center, which is based at the CIA headquarters in Langley, Virginia. The received list of technologies mentions malware, viruses and remote control systems for malware that the CIA allegedly infects hackers and contractors of the US government. Specific names and descriptions of hacker tools are depicted: Achilles, Aeris and SeaPea.

Viruses hide where they send data.

According to Wikileaks, Achilles allows the CIA to infect Trojans with an image of the Mac installation disk with the extension *. Dmg. In this case, one or even several operations can be performed, which will allow further monitoring of certain user actions.

Aeris is designed to steal information from electronic media and is adapted for Linux. This automated implant is written in C language and can infect many distributions, including - Debian, Red Hat, Solaris, FreeBSD and CentOS. In Wikileaks argue that this software operates on the principles of backdoors - intentional defects of algorithms, sharpened for specific operations. Wikileaks claims that Aeris supports automatic file filtering, standalone HTTPS LP protocol support and SMTP protocol support. All this - with encrypted TLS communication with mutual authentication.

Finally, SeaPea is used by the CIA as a rootkit for Mac OS X versions 10. 6 and 10. 7, and allows agents to be introduced into the system when it reboots to perform monitoring and start-up operations. Also SeaPea hides from users those connections, through which data is transmitted from an infected computer.

The CIA employs 5 thousand. Hackers.

This leak was a continuation of the March, when the portal Wikileaks published a series of 8.7 thousand. Documents under the general title "Dark Matter" ("Black Matter"). According to that information, the CIA learned to hack into Apple's hardware 10 years ago, including iPhone and Mac. Some of the implants and rootkits were embedded in the kernel and firmware immediately after they left the assembly line, before they even fell into the hands of end users.

In Apple, then stated that all the problems described have long been resolved. Julian Assange (Julian Assange) in response, offered the company specific mechanisms to fix bugs with one condition: all the shortcomings will be eliminated within 90 days. Apple refused to negotiate.

In May, another publication devoted to hacker components that could seriously destabilize an infected system. In particular, the malicious AfterMidnight framework delayed or completely canceled the execution of user tasks (for example, in the Microsoft PowerPoint application). Another backdoor - Assassin - helped the CIA get data from computers.

In Wikileaks believe that back in 2001. The CIA won political and budgetary supremacy over the US National Security Agency, after which Langley created its own hacker unit. By the end of 2016 g. Its number reached 5 thousand. People who over the years have released more than a thousand hacker systems, trojans, viruses and other malicious software.




Add a comment
:D :lol: :-) ;-) 8) :-| :-* :oops: :sad: :cry: :o :-? :-x :eek: :zzz :P :roll: :sigh:
 Enter the correct answer