Home » Geopolitics » WikiLeaks Publishes CIA Hacking Tool Designed To “Impersonate” Russia’s Kaspersky Lab

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

WikiLeaks Publishes CIA Hacking Tool Designed To “Impersonate” Russia’s Kaspersky Lab

WikiLeaks Publishes CIA Hacking Tool Designed To “Impersonate” Russia’s Kaspersky Lab

On September 18th, the US Senate voted to ban the use of products from the Moscow-based cyber security firm Kaspersky Lab by the federal government, citing national security risk. The vote was included as an amendment to an annual defense policy spending bill approved by the Senate on the same day and was written to bar the use of Kaspersky Lab software in government civilian and military agencies.

Alas, according to a new revelation from WikiLeaks this morning, any perceived “national security risk” from Kaspersky could have resulted from the fact that the CIA specifically designed hacking software, code-named ‘Hive’, which intentionally “impersonated” the Russian cyber security firm so that “if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.”

Here’s a summary of the hacking tool posted by WikiLeaks:

Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.

Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress