WikiLeaks: How the CIA Disguises Its Hacking to Appear to Be Foreign

CIA Headquarters Podium
Share:

Friday morning, WikiLeaks released the third of its “Vault 7” data and document dumps related to CIA hacking.

This latest drop, codenamed “Marble,” features 676 source code files for the CIA’s secret anti-forensic Marble Framework, which was used to hamper forensic investigators and anti-virus companies from attributing viruses, Trojans and hacking attacks to the CIA. It did this by hiding fragments of text used in its malware from visual inspection.

“This is the digital equivalent of a specialized CIA tool to place covers over the English-language text on U.S.-produced weapons systems before giving them to insurgents secretly backed by the CIA,” the anti-secrecy group stated in a press release announcing the drop. “Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is ‘[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.'”

WikiLeaks claims the Marble source code also includes a “deobfuscator” to reverse the hidden text. This, along with other revealed techniques, patterns and signatures, can be used by forensic investigators to correctly attribute previous hacking attacks and viruses to the CIA.

According to the group’s statement, the U.S. spy agency can make the attacks appear to be Russian, Chinese, North Korean, Saudi Arabian or Iranian.

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, but there are other possibilities, such as hiding fake error messages,” it stated. “The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.”

This latest release follows the group’s second release, codenamed “Dark Matter,” by a little more than a week. In that statement, the group exposed how the CIA has infected Apple Mac firmware used on both computers and smartphones since at least 2008. {eoa}

+ posts
Share:

Related topics:

See an error in this article?

Send us a correction

To contact us or to submit an article

Click and play our featured shows

Worried man sitting up in bed

Are You Worried Sick? Jesus Has the Answer for Anxiety

Americans are stressed out. The problem was bad enough before the pandemic, but statistics skyrocketed during and after that crisis. Today, more than 42 million people in this country suffer from an anxiety disorder, according to Mental Health America, and...

A woman starting a fast.

Jentezen Franklin: Why Fast?

Today, I am thrilled to see millions of Christians worldwide placing such a great emphasis on prayer and fasting. Looking back over our ministry and seeing all God has done as we continue to seek Him every year in an...

John Ramirez

John Ramirez Gives a Spiritual Warning for 2024

In a recent message, John Ramirez gave a warning for the spiritual battles that lay ahead of us in 2024. “The Lord spoke to me regarding 2024. He says, ‘speak to My people. It’s not a happy message; it’s a...

Prepping for disasters.

Are You Prepared for the Potential of Societal Breakdown?

In the new Netflix film, “Leave The World Behind,” a haunting vision of societal breakdown unfolds as an oil tanker crashes into a tourist beach, planes fall from the sky and technology that underpins civilization fails. Though fictional, the movie...

digital rendering of 2024

10 Biblical Promises for a Blessed 2024

The Scriptures provide us with numerous conditional promises and commands that, if followed, will ultimately ensure a blessed future. This doesn’t imply that walking with God will shield us from all challenges or suffering. It pertains to the rewarding outcomes...

1 2 3 4 92 93 94 95 96 97 98 99 100
Scroll to Top