Menu
Menu
Latest WikiLeaks dump exposes CIA methods to mask malware

Latest WikiLeaks dump exposes CIA methods to mask malware

The site has dumped anti-forensic tools that WikiLeaks claims the CIA used last year

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks.

On Friday, the site dumped the source code to the Marble Framework, a set of anti-forensic tools that WikiLeaks claims the CIA used last year.

The files do appear to show “obfuscation techniques” that can hide CIA-developed malicious coding from detection, said Jake Williams, a security researcher at Rendition InfoSec, who has been examining the files.

Every hacker, from the government-sponsored ones to amateurs, will use their own obfuscation techniques when developing malware, he said.

But thanks to WikiLeaks, some of the CIA’s methods are out in the public. Security researchers will now have a resource to identify whether past malware samples have any ties to the U.S. spy agency, Williams said.

WikiLeaks has said the same. But the site is also drawing another conclusion with the source code: that the CIA can frame other countries for its malware attacks.

WikiLeaks points to how the CIA anti-forensic tools support other languages such as Chinese, Russian, Korean, Arabic and Farsi. “This would permit a forensic attribution double game,” the site said.

Security researchers, for instance, might misattribute CIA-developed malware to other countries, when noticing it contained certain foreign languages.

But Williams doesn’t buy that conclusion. “That’s ludicrous,” he said. “It’s wholly inaccurate.”

The anti-forensic tools are actually designed to conceal the presence of computer code written in foreign languages, not reveal it, Williams said.

That’s important because the agency was probably targeting computers overseas from Russia or China. To hack those systems, the CIA probably needed to include some Russian or Chinese language in the malware.

“But if you don’t obfuscate that,” Williams said. “Anyone who is looking at your malware will know you are trying to steal their stuff.”

It’s not the first time WikiLeaks has made claims that were later questioned. Security researchers have criticized the site for exaggerating the CIA’s hacking capabilities since WikiLeaks began dumping tools allegedly taken from the agency.

The CIA hasn’t commented on Friday’s dumped source code. But assuming the files are real, security researchers say they’ll probably disrupt the agency’s spying efforts.

“This is one of the most damaging releases ever done by WikiLeaks,” tweeted Nicholas Weaver, a researcher at the International Computer Science Institute at the University of California Berkeley.

In addition, hackers will be able to learn from the dumped source code to obfuscate their own malware. "Now anyone can create malware that looks like it came from the CIA," Williams said.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Error: Please check your email address.

More about

Show Comments

Market Place

Computerworld
ARN
Techworld
CMO