Wednesday 22 March 2017

SPECIAL EDITION; WIKILEAKS & CIA



By Ekow Mensah
Last week, Wikileaks unfurled as many as 8,000 pages of secrets of the Central Intelligence Agency (CIA) of the United States of America.

These disclosures have shocked the world to the marrow especially at a time when the Trump administration is engaged in a battle of nerves with intelligence officials who blame Russia for hacking into the emails of top US politicians.

As things turn out, the United States of America appears to be on top of the league when it comes to hacking into systems for the achievement of political ends.

The revelation show that even the smart TV in your sitting room can be turned into your enemy by the CIA. It can be made to record your conversations and generally spy on you.

The CIA can also take over the electronics in your car and use it to assassinate you in a manner which cannot be traced to it.

As for hacking emails, it is small potatoes for the CIA which has overthrown several governments in Africa, Latin America and Asia.

In the case of Ghana, the CIA sponsored the overthrow of the Nkrumah Government on February 24, 1966 by its local agents in the Armed Forces and the Police and the United Party (UP).
Documents from the British High Commission in Accra show clearly that Nkrumah was overthrown largely because he was making the African too politically conscious.
The documents released by Wikileaks show that the CIA has been investigating ways to hack and manipulate the control systems of cars and trucks for use in covert operation.

According to Wikileaks, the CIA’s interest in hacking vehicles is not specified, but could be used in sinister ways, including assassinations.

Many modern cars and trucks are heavily electronic and use computer systems to control their brakes, windows, doors and acceleration.

The Insight is publishing some of the leaked documents and analysis in this special issue for the benefit of our readers.

WikiLeaks, “Year Zero” and the CIA Hacking Files
By Dr. Binoy Kampmark
It is now up to the device and OS manufacturers, like Apple, Google, or Samsung, to fix their volcanoes back into mountains. -Telegram Statement, Mar 8, 2017

The paradox with information releases that expose a supposedly grand internal stratagem is that they merely provide the food of confirmation otherwise lacking.  Such food is potent.  It blows the lid off the suggestion that a conspiracy theorist was merely a Cassandra in the wilderness chewing fingernails in fear that something hideous was afoot. It provides nutrients for those seeking greater scrutiny over the way state security, otherwise deemed the domain of closeted experts, is policed.

The entire profession (for it has now become one) of mass disclosures of secret or classified documentation has reached a point where its normality can hardly be questioned.  Be it the juicy revelations of Edward Snowden in 2013, the work of WikiLeaks in this decade and the last, and the Panama Papers, whistleblowing, still punished and frowned upon, remains indispensable to the conversation about transparency and the inner operations of the Dark State and its accessories.

That Dark State was given a further lighting up on Tuesday with the release, by WikiLeaks, of its CIA Vault 7 and Year Zero series that has caused the usual flutter in the intelligence community and governments.

These comprise the machinery of hacking and cyber war tactics, an overview of methods that suggest, according to WikiLeaks, a loss of control by the agency over a good deal of its hacking arsenal (“malware, viruses, Trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation”).[1]

The releases reveal aspects of the internal functions of the organisation, including the works of its Engineering Development Group (EDG), dedicated to the development of software within the Center for Cyber Intelligence.

Barack Obama exposed!
As WikiLeaks revealed, the sophisticated nature of surveillance is now such as to draw comparisons with George Orwell’s 1984 “but ‘Weeping Angel’, developed by the Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.”[2]Samsung has figured prominently in such attacks jointly conducted with Britain’s MI5/BTSS.

Even of more concern is that such methods, similar to the hoovering techniques of trawler surveillance, tend to hamper, rather than sharpen, discrimination regarding targets of value. Malware, in making its way into a range of devices (iPhones, Android, smart TVs), lingers like an innocuous, odourless smell.

This makes suggestions of ‘targeted’ surveillance, or surveillance against countries other than those of the Five Eyes, absurd. (Vide the opinions of Australia’s insipid Christopher Pyne, who assumes with school boy innocence that Washington would never have an interest in spying on Australian subjects.)

Controls over the nature of who receives or uses such devices or operating systems are less relevant than the nature of the devices, adjusted and cooked to the right level of surveillance. So called “smart” devices are hardly discerning in that regard.

The releases have also seen a rapid scramble on the part of app companies to claim that the Vault and Zero Year coverage by WikiLeaks reveals a crude reality: you simply cannot rely on the security of your messaging format.

“To put ‘Year Zero’ into familiar terms,” the statement from Telegram instructs with confidence piercing clarity, “imagine a castle on a mountainside.  That castle is a secure messaging app. The device and its OS are the mountain.  Your castle can be strong, but if the mountain below is an active volcano, there’s little your engineers can do.”[3]
The statement by Telegram goes on to charmingly remind users that it would not matter “which messenger you use. No app can stop your keyboard from knowing what keys you press.  The focus, then, is on “devices and operating systems like iOS and Android” not on the level of apps.  “For this reason,” the app company insists, “naming any particular app in this context is misleading.”

Ex CIA Boss John Brennan
What is not misleading is the effect of such surveillance, the insecurity it inflicts on customers, and the rampant breach of privacy. The intelligence agencies find themselves running out of breath, bloated and spread.  Their outsourcing of services through less secure channels – namely contractors – has also unleased a demon they can barely control.

Defenders of such methods spring back into a default mode that assumes WikiLeaks has done something terrible, emboldening enemies of the United States as defender of the now poorly described “free world”.  Pundits and former members of the security coven fear that the disclosure of the CIA playbook on this is somehow tantamount to giving away the family silver to a suicide bomber in search of martyrdom.   The pertinent question here, surely, is defending that world from within as a matter of course.

Even the most dyed-in-the-wool establishment type has to concede that the intelligence community, puffing and out of breath, is there for the trimming, a vigorous pruning that just might ensure its reinvigoration and relevance.

The CIA is a beast in maturation, adjusting, and flexing its muscles in accordance with circumstance.  It is to be watched, accordingly cleaned and overseen by diligent groundsmen and women.  Sadly, the members of Congress are not necessarily the most able, or willing, to do that watching.  An external impetus, miraculously supplied, might well do the trick.

Dr. Binoy Kampmark was a Commonwealth Scholar at Selwyn College, Cambridge.  He lectures at RMIT University, Melbourne.  Email: bkampmark@gmail.com
Notes
The original source of this article is Global Research

WikiLeaks Warns CIA Trying to Hack Cars for ‘Undetectable 
Assasinations’

In the explosive “Vault 7” CIA secrets published by WikiLeaks on Tuesday, the organization has warned that the CIA, among a myriad of other intrusive exploits, has been investigating ways to hack and manipulate the control systems of cars and trucks for use in covert operations.

According to WikiLeaks, the CIA’s interest in hacking vehicles is not specified, but could be used in sinister ways, including assassinations.

"As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks," WikiLeaks said in a statement. "The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations."

Many current vehicles are now mainly controlled by computer systems — including brake control, air bags, acceleration, steering, door locks, and other vital systems.

In 2014, hackers Charlie Miller and Chris Valasek using their laptops while in the car, took over a Jeep Grand Cherokee driven by a reporter for Wired, as they were traveling on the highway. The demonstration was shocking, and lead to the recall of 1.4 million vehicles. The previous year, hackers compromised a Ford Escape and a Toyota Prius, while sitting in the backseat.

The vehicle hacking reports were contained in the first batch of CIA leaks, titled “Year Zero.” Wikileaks published 8,761 documents and files which they claim are from the CIA's Center for Cyber Intelligence in Langley, Virginia.

WikiLeaks has a 100-percent track record for publishing authentic documents.
NSA whistleblower Edward Snowden has also chimed in on the issue, tweeting, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

The WikiLeaks Revelations and the Crimes of US Imperialism
By Andre Damon
With increasing frequency, aggressive foreign policy moves by Washington have been palmed off by the media and political establishment as defensive responses to “hacking” and “cyber-espionage” by US imperialism’s geopolitical adversaries: Russia and China.

For months, news programs have been dominated by hysterical allegations that Russia “hacked” the Democratic National Committee in order to subvert the 2016 election. As the print and broadcast media were engaged in feverish denunciations of Russia, the US and its NATO allies moved thousands of troops and hundreds of tanks to the Russian border.

Not content to allege interference only in the American election, the US media and its international surrogates have alleged Russian meddling in elections in France, Germany and other far-flung countries. Prior to the current furor over Russian “hacking” of the election, the Obama administration used allegations of “hacking” and “intellectual property theft” to justify the trade sanctions and military escalation against China that accompanied its “pivot to Asia.”

Whenever the State Department, the CIA or unnamed “intelligence officials” proclaim another alleged “cyber” provocation by Washington’s geopolitical rivals, news anchors breathlessly regurgitate the allegations as fact, accompanying them with potted infographics and footage of masked men in darkened rooms aggressively typing away at computer keyboards.

But the official narrative of a benevolent and well-intentioned US government coming under attack from hordes of Russian and Chinese hackers, spies and “internet trolls” was upended Tuesday with the publication by WikiLeaks of some 9,000 documents showing the methods used by the Central Intelligence Agency to carry out criminal cyber-espionage, exploitation, hacking and disinformation operations all over the world.

The documents reveal that the CIA possesses the ability to exploit and control any internet-connected device, including mobile phones and “smart” televisions. These tools, employed by an army of 5,000 CIA hackers, give the agency the means to spy on virtually anyone, whether inside or outside the United States, including foreign governments, “friend” and foe alike, as well as international organizations such as the United Nations.

Ex US President George Bush
The WikiLeaks documents expose the United States as the world’s greatest “rogue state” and “cyber criminal.” The monstrous US espionage network, paid for with hundreds of billions in tax dollars, uses diplomatic posts to hide its activities from its “allies,” spies on world leaders, organizes kidnappings and assassinations and aims to influence or overturn elections all over the world.

On Tuesday, former CIA director Michael Hayden replied to the revelations by boasting, “But there are people out there that you want us to spy on. You want us to have the ability to actually turn on that listening device inside the TV to learn that person’s intentions.”

One can only imagine the howls of indignation such statements would evoke in the American press if they were uttered by a former Russian spymaster. In his comments, Hayden barely attempts to cover up the fact that the United States runs a spying and political disruption operation the likes of which Russian President Vladimir Putin or Chinese President Xi Jinping could only dream of.

US President Barack Obama
The WikiLeaks documents show that the United States seeks to cover up its illicit operations by planting false flags indicating that its geopolitical adversaries, including Russia and China, bear responsibility for its crimes.

Cybersecurity expert Robert Graham noted in a blog post, for example, that
“one anti-virus researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak.”

The revelations have already begun to reverberate around the world. German Foreign Ministry spokesman Sebastian Fischer said Wednesday that Berlin was taking the revelations “very seriously,” adding, “issues of this kind emerge again and again.” Meanwhile Germany’s chief prosecutor has announced an investigation into the contents of the documents, with a spokesperson telling Reuters,

“We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators…We’re looking at it very carefully.”

The documents expose the CIA’s use of the US consulate in Frankfurt, Germany as a base for its spying and cyber operations throughout Europe, employing a network of intelligence personnel including CIA agents, NSA spies, military secret service personnel and US Department of Homeland Security employees. Many of these operatives were provided with cover identities and diplomatic passports in order to hide their operations from the German and European governments.

Wednesday’s rebuke by the German government followed the revelations in 2013 by Edward Snowden that “unknown members of the US intelligence services spied on the mobile phone of Chancellor Angela Merkel,” as Germany’s top prosecutor put it in 2015.

The US media, true to its function as a propaganda arm of the CIA and other intelligence agencies, immediately sprang into action to minimize the significance of the revelations and to accuse Russia, entirely without substantiation, of having released the documents in an effort to subvert US interests.

Ex US President Bill Clinton
NPR quoted favorably the statements of Hayden, who declared, “I can tell you that these tools would not be used against an American,” while the Washington Post quoted a bevy of security experts who said there is nothing to worry about in the documents. It favorably cited one such “expert,” Jan Dawson, who declared, “For the vast majority of us, this does not apply to us at all … There’s no need to worry for any normal law-abiding citizen.”

Such absurd statements, made about a security apparatus that was proven by Snowden’s revelations to have spied on the private communications of millions of Americans, and then lied about it to the public and Congress, were taken as good coin by the US media.

Just one day after the WikiLeaks revelations, the media spin machine was already busy portraying them as part of a Russian conspiracy against the United States, and indicting WikiLeaks for acting as an agent of foreign powers. “Could Russia have hacked the CIA?” asked NBC’s evening news program on Wednesday, while another segment was titled “Could there be a [Russian] mole inside the CIA?”

The types of spying and disruption mechanisms revealed in the documents constitute a key instrument US foreign policy, which works to subvert the democratic rights of people all over the planet in the interest of US imperialism. No methods, whether spying, hacking, blackmail, murder, torture, or, when need be, bombings and invasion, are off the table.
The original source of this article is World Socialist Website
Copyright © 
Andre DamonWorld Socialist Website, 2017

CIA Hackers: Why WikiLeaks 'Vault 7' Becomes a Wake-Up Call For Users, IT Giants

The world's IT giants are scrupulously analyzing the latest WikiLeaks' disclosure of the CIA hacking practices, and signaling that many of the vulnerabilities mentioned in the leaked reports have already been patched. However, it appears that it's too early to heave a sigh of relief.
 
The release of the much discussed Vault 7 has become a wake-up call for computer users and IT giants: this time WikiLeaks, an international non-profit organization that publishes secret information from anonymous sources, has unveiled how the mighty CIA has been hacking the entire world.

The files, leaked by the non-profit organization, indicate that for years the CIA has been methodically seeking and exploiting vulnerabilities in globally-famous software and hardware platforms in order to take control over them.

According to the documents, the CIA hacking group possessed tools allowing them to infect a target computer bypassing PSPs (Personal Security Product).

For instance, one of the files, entitled "Kaspersky 'heapgrd' DLL Inject," describes Russian cybersecurity provider Kaspersky Lab's PSPs vulnerabilities.

"The Kaspersky AVP.EXE process references a DLL called WHEAPGRD.DLL. This DLL is supposed to be located in one of the Kaspersky directories (which are protected by the PSP). Due to a UNICODE/ASCII processing mistake, the DLL name is prepended with the Windows installation drive letter, rather than the full path to the DLL. For typical installations, this causes Kaspersky to look for the DLL 'CWHEAPGRD.DLL' by following the standard DLL search path order. Loading our own DLL into the AVP process enables us to bypass Kaspersky's protections," the document reads, adding that "this vulnerability is limited to some of Kaspersky's previous releases."

The other document presents a screenshot of a "selected number of DLL misses from Kaspersky TDSS Killer Portable."

Commenting on the issue, Kaspersky Lab spokesperson Olga Bogolyubskaya told Sputnik that the aforementioned DLL "heapgrd" vulnerability had been disclosed and fixed back in 2009.

"Moreover, all new company products are subject to mandatory testing for this and other vulnerabilities before release," she stressed.

"The products mentioned by WikiLeaks (KIS 7, KIS 8, WKSTNMP3) are obsolete versions of Kaspersky Lab's security software; [the company] has not provided technical support for these products for several years," Bogolyubskaya explained.

Indeed, the CIA report published by WikiLeaks admits that Kaspersky Lab's more recent software products KIS 9+ and WKSTN MP4 do not have this vulnerability.

"As for the DLL inject vulnerability in the TDSSKiller utility, also mentioned in the WikiLeaks report, it was closed in December 2015," she said.

"Kaspersky Lab emphasizes that the documents published by WikiLeaks do not indicate that the given vulnerabilities were applied in practice against the solutions of Kaspersky Lab or other manufacturers of security software, but [they] describe the software analysis by using a 'reverse engineering' method," Bogolyubskaya elaborated.

Earlier Kaspersky Lab said in an official statement that it is currently studying the latest reports released by WikiLeaks.

"Kaspersky Lab is thoroughly studying the report published on WikiLeaks on March 7, 2017 in order to make sure that our clients are out of danger. The company pays special attention to such reports and statements," the statement said, highlighting that the cybersecurity of Kaspersky Lab's clients is the company's top priority.

For its part, American cybersecurity provider Comodo Group, Inc., also mentioned in leaked CIA reports, said that the vulnerability in Comodo 6 antivirus, described by the CIA, was obsolete.

Likewise, Apple Inc. called attention to the fact "many of the issues leaked today were already patched in the latest iOS."

"While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities. We always urge customers to download the latest iOS to make sure they have the most recent security updates," an Apple spokesperson said as quoted by Techcrunch.com.

While the world's leading software and hardware developers rushed to announce that they have either patched or are analyzing the vulnerabilities highlighted by WikiLeaks' CIA exposure, Google Inc. was the last one to dispel the mounting doubts.

"As we've reviewed the documents, we're confident that security updates and protections in both Chrome and Android already shield users from many of these alleged vulnerabilities. Our analysis is ongoing and we will implement any further necessary protections. We've always made security a top priority and we continue to invest in our defenses," Heather Adkins, Google's Director of Information Security and Privacy, told Recode.net.

Does it mean that computer users across the globe may now breathe a huge sigh of relief?

Unlikely. The truth of the matter is the disclosure covers the period between 2013 and 2016 and apparently presents just the tip of the iceberg.

"The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers," WikiLeaks press release says.

"In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons," WikiLeaks highlights.

WikiLeaks CIA Vault 7: 'We are looking at George Orwell’s 1984’
WikiLeaks revelations about the CIA and its scope of activity show that this is not only a security issue - it impacts businesses while the privacy we take for granted is at risk. It is a very dangerous path for democracy to go down, experts told RT.

Whistleblowing website WikiLeaks released on Tuesday a part of confidential documents on America's Central Intelligence Agency. WikiLeaks said that this collection of leaked CIA documents which revealed the extent of its hacking capabilities was “less than one percent of its Vault 7 series”.

These documents also includes revelations that the CIA is apparently able to disguise its own spying as the work of other countries.

RT discussed the revelations with former CIA officers, whistle-blowers and IT experts.

‘Modern aspect of cyber-war’
Dr. Binoy Kampmark, Senior Lecturer from RMIT University in Melbourne, told RT that “potentially, it is very significant, because what it does show, should it actually come out to be the case, the demonstrable pattern of engagement by the CIA in terms of its hacking techniques.”

“That is particularly valuable and that is particularly illuminating. In time it may very well be that his particular disclosure will reveal a very modern aspect of the cyber war,” he continued.

“And this is what the President of the US more or less said that the US has to arm for the next cyber conflict, that essentially this is an age of a cyber-war. All of this demonstrates the sheer seriousness and the importance of understanding these capabilities but also, of course, the race as it were between various agencies to identify the best means or the most effective means of actually hacking into systems,” Kampmark said.

‘Spotlight into a dark area’
Larry Johnson, retired CIA and State Department official said that “this material is significant in that it shows just how robust and how organized the CIA effort is, at least overseas, to be engaged with cyber activities.”

“Frankly, I think they should be, but we also recognize that other major powers are also doing the same thing, it provides a little bit, I guess, of spotlight into a dark area, that is normally not accessible  to the public,” he added.

‘Not just a security issue, impacts business’
Asked about whether it is really Russian hackers that people should be worrying about, John Safa, Pushfor Founder, told RT that his experience is that "there are hackers all over the globe”.

In Safa’s view, “this is quite damaging information in these documents. Especially because some of this is validated by legitimate source code that is in there as well. I don’t think it is just the Russians at all, there are very clever security experts both in the UK here in London and also in the US.”

Safa told that his biggest concern is with the messaging tools. "The part of these documents have demonstrated that a lot of our popular tools, like WhatsApp and Telegram have been hacked. And obviously this is starting to be reflected in Europe. Deutsche Bank banned WhatsApp. They must have obviously know something was going on.”

Safa said he thinks “it is going to be repercussions in lots of different verticals and in lots of different industries. Because obviously this impacts their businesses. That is not just a security issue, but it also impacts business. What information could get leaked out, if this information gets into wrong hands? So, this has really serious ramifications.”
‘We are looking at “1984”

Annie Machon, former MI5 intelligence officer, recalled that “last year, there was the biggest botnet attack ever, which took down the Internet across Western America, then across Eastern America, and them across some of the Western Europe.”

"And this botnet was built on smart devices within people’s homes. Not their computers, not their phones, but on things like smart fridges, smart computers, that sort of thing, and smart televisions, as well. It is utterly feasible that all these devices have already been hacked and they are used to spy on us.”

“We are looking at the George Orwell “1984” novel where we have screens in our flats potentially watching us. I remember back in the 1990s, the capability was there to implant software onto primitive mobile phones, onto primitive computers, so that they could indeed be switched on to record and film us and log our keystrokes,” Machon said.

“However, back in those days, there was a notion of oversight, and there was a notion of targeted surveillance, which is what we need to prevent the bad guys doing bad things to us. And it was also very labor-intensive.  Because of the massive expansion of the Internet and technology, now they can do it on the industrial scale, which is what they seem to have developed. Which means that none of us has any inherent sense of privacy, unless we take quite extreme actions to protect our privacy even in our homes,” she added.

Machon warned the new technological realities “is very dangerous for fully functioning democracy. Because once you lose the sense that you have privacy to talk, to write, to watch, to read, then suddenly you might start self-censoring yourself in the sense that you inhibit what you do. So you can’t fully inform yourself, be fully informed participatory citizen in a democracy. It is a very dangerous path to go down.”

Mysterious Disk Wiper: WikiLeaks Reveals How CIA Weaponized 'Shamoon' Malware

Edward Snowden
By Ekaterina Blinova
WikiLeaks' exposure of CIA hacking tools and practices has raised a number of issues. It appears that by weaponizing malware, viruses, Trojans, remote control systems and secretly exploiting the vulnerabilities of popular software and hardware, the CIA's hacking division has crossed the red line.

The latest WikiLeaks exposure has given both enterprises and ordinary consumers of IT products the shivers.

While former NSA contractor Edward Snowden's revelations shed light on the extent of US global surveillance, the WikiLeaks files offer an inside peek at how the intrusion has been carried out.

WikiLeaks' "Year Zero" document collection has introduced "the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of 'zero day' weaponized exploits against a wide range of US and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones."

While the real magnitude of the problem has yet to be evaluated, the question remains open, whether the US government and Silicon Valley giants were aware of the CIA's hacking problem.

Commenting on the explosive leak Tuesday, Snowden tweeted: "If you're writing about the CIA/@Wikileaks story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe."

​"The CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words," he added.

​However, besides targeting potential US adversaries overseas by penetrating into their systems, it appears that the US intelligence community had no scruples about exposing American citizens to both its spying practices and potential data theft by external intruders.

"Evidence mounts showing CIA & FBI knew about catastrophic weaknesses in the most-used smartphones in America, but kept them open — to spy," Snowden pointed out, referring to the leaked documents.

The WikiLeaks press release called attention to the fact that "the same vulnerabilities exist for the population at large, including the US Cabinet, Congress, top CEOs, system administrators, security officers and engineers."

"By hiding these security flaws from manufacturers like Apple and Google, the CIA ensures that it can hack everyone, at the expense of leaving everyone hackable," the press release stated.

Furthermore, in addition to its capability to break into both civilian and government systems, the CIA is capable of hiding the traces of its intrusion and, what is more interesting, the intelligence agency can also leave behind "fingerprints" belonging to hackers from other nations due to its substantial library of attack techniques "stolen" from malware produced in other states.

Meanwhile, on early Tuesday, ArsTechnica.co.uk published an article describing the Data-wiping malware program Shamoon and warning that the virus is likely to make a successful comeback.

"Shamoon — the mysterious disk wiper that popped up out of nowhere in 2012 and took out more than 35,000 computers in a Saudi Arabian-owned gas company before disappearing — is back," the media outlet wrote, citing Russian multinational cybersecurity provider Kaspersky Lab.

The provider has revealed it observed "three waves of attacks of the Shamoon 2.0 malware, activated on 17 November 2016, 29 November 2016 and 23 January 2017."

While analyzing the Shamoon 2.0 attacks, Kaspersky Lab stumbled upon a new wiper strikingly similar to Shamoon. The company dubbed it "StoneDrill."

According to the company, the new malware possesses an impressive ability to evade detection and includes functions that are used for espionage purposes.

"StoneDrill has several 'style' similarities to Shamoon, with multiple interesting factors and techniques to allow for the better evasion of detection," the press release said.
Kaspersky Lab remarked that while Shamoon 2.0 appears to have a language ID of "Arabic (Yemen)," suggesting the attackers might be from Yemen, "StoneDrill" has the traces of the Persian language in multiple resource sections.

The cybersecurity provider stressed that the embedded language sections could have been "false flags" intended to mislead investigators about the origins of the malware.

So, what does Shamoon have to do with the latest WikiLeaks disclosure?

The crux of the matter is that the malware could have been used by the CIA's hacking group for data destruction. This malware is described in the CIA files as part of its Component Library.

"The UMBRAGE team maintains a library of application development techniques borrowed from in-the-wild malware. The goal of this repository is to provide functional code snippets that can be rapidly combined into custom solutions. Rather than building feature-rich tools, which are often costly and can have significant CI value, this effort focuses on developing smaller and more targeted solutions built to operational specifications," one of the leaked CIA files reads.

"When possible, each item should include a working example of the technique (and/or pointer to code in the SVN repository), documentation describing the application of the technique, and notes concerning our use of these techniques in delivered tools," it added.

In the section describing components related to destroying data on a target system, the CIA highlights the much-discussed Shamoon malware.

"The Shamoon malware made use of a legitimate, signed driver from a commercial company called Eldos," the CIA report says.

"This method is quite obvious and trivial to implement, since it involves using a signed driver to perform raw disk access.  The biggest limitation is that it requires the installation of a driver on the target system," it adds.

While it does not necessarily mean that the CIA could have been behind the recent attacks mentioned by Kaspersky Lab, WikiLeaks files clearly indicate that the US intelligence agency has weaponized and most probably reused the malware for its own needs. The files also show that the CIA hacking group could use "fingerprints" belonging to foreign hacking groups.

The question then arises, where legal operative work ends and mere hacking begins.

Let’s Give the CIA the Credit It Deserves. “America’s Fantastic Hacking Achievements”
By Norman Solomon
For months now, our country has endured the tacit denigration of American ingenuity. Countless statements — from elected officials, activist groups, journalists and many others — have ignored our nation’s superb blend of dazzling high-tech capacities and statecraft mendacities. 

Fortunately, this week the news about release of illuminating CIA documents by WikiLeaks has begun to give adequate credit where due. And not a moment too soon. For way too long, Russia has been credited with prodigious hacking and undermining of democracy in the United States.

Many Americans have overlooked the U.S. government’s fantastic hacking achievements. This is most unfair and disrespectful to the dedicated men and women of intelligence services like the CIA and NSA. Far from the limelight, they’ve been working diligently to undermine democracy not just overseas but also here at home.

Today, the massive new trove of CIA documents can help to put things in perspective. Maybe now people will grasp that our nation’s undermining of democracy is home-grown and self-actualized. It’s an insult to the ingenious capacities of the United States of America to think that we can’t do it ourselves.

Contrary to all the public relations work that U.S. intelligence agencies have generously done for them, the Russians don’t even rank as peripheral to the obstacles and prospects for American democracy. Rest assured, throughout the long history of the United States, we haven’t needed foreigners to get the job done.

In our current era, can Vladimir Putin take any credit for purging huge numbers of African Americans, Latinos and other minority citizens from the voter rolls? Of course not.

Did Putin create and maintain the barriers that prevented many low-income people from voting on November 8? Only in his dreams.

Can the Kremlin hold a candle to the corporate-owned cable TV channels that gave Donald Trump umpteen free hours of uninterrupted air time for speeches at his campaign rallies? Absolutely not.

Could any Russian operation claim more than a tiny sliver of impact compared to the handiwork of FBI Director James Comey as he boosted Donald Trump’s prospects with a pair of gratuitous announcements about a gratuitously re-opened probe of Hillary Clinton’s emails during the last days of the 2016 campaign? No way.

Is Putin anything but a miniscule lightweight in any efforts to manipulate the U.S. electorate compared to “dark money” American billionaires like the Koch brothers? Give us a break.

And how about the Fourth Amendment of the U.S. Constitution? The Kremlin can only marvel at the way that the CIA, the NSA and the bipartisan leadership in Washington have shredded the Fourth Amendment while claiming to uphold it.

To sum up: The CIA’s efforts to tout Russia add up to jaw-dropping false modesty! The humility of “deep state” leaders in Langley is truly awesome.

Let’s get a grip. Overwhelmingly, the achievements of thwarting democracy in America have been do-it-yourself operations. It’s about time that we give adequate credit to the forces perpetuating this country’s self-inflicted wounds to American democracy.

To loosely paraphrase the beloved comic-strip character Pogo, when the subject is grievous damage to democracy at home, “We have met the ingenuity and it is U.S.” But we’re having a terrible time recognizing ourselves.

Norman Solomon is the coordinator of the online activist group RootsAction.org and the executive director of the Institute for Public Accuracy. He is the author of a dozen books including “War Made Easy: How Presidents and Pundits Keep Spinning Us to Death.”
This article is licenced under Creative Commons
The original source of this article is Global Research
Copyright © 
Norman Solomon, Global Research, 2017





No comments:

Post a Comment