Header Ads

WikiLeaks Reveals 'AfterMidnight' & 'Assassin' CIA Windows Malware Frameworks

WikiLeaks Reveals 'AfterMidnight' & 'Assassin' CIA Malware Frameworks














'AfterMidnight' Malware Framework


According to a statement from WikiLeaks, 'AfterMidnight' allows its operators to dynamically load and execute malicious payload on a target system.





AfterMidnight uses an HTTPS-based Listening Post (LP) system called "Octopus" to check for any scheduled events.




'Assassin' Malware Framework


Assassin is also similar to AfterMidnight and described as "an automated implant that provides a simple collection platform on remote computers running the Microsoft Windows operating system."

Once installed on the target computer, this tool runs the implant within a Windows service process, allowing the operators to perform malicious tasks on an infected machine, just like AfterMidnight.

Assassin consists of four subsystems: Implant, Builder, Command and Control, and Listening Post.



Microsoft Slams NSA For Its Role in 'WannaCry' Attack


Even Microsoft President Brad Smith condemned the US intelligence agency’s practice, saying that the "widespread damage" caused by WannaCry happened due to the NSA, CIA and other intelligence agencies for holding zero-day security vulnerabilities.
"This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world," Smith said.
Since March, the whistleblowing group has published 8 batches of "Vault 7" series, which includes the latest and last week leaks, along with the following batches:
  • Year Zero – dumped CIA hacking exploits for popular hardware and software.
  • Weeping Angel – spying tool used by the agency to infiltrate smart TV's, transforming them into covert microphones.
  • Dark Matter – focused on hacking exploits the agency designed to target iPhones and Macs.
  • Marble – revealed the source code of a secret anti-forensic framework, basically an obfuscator or a packer used by the CIA to hide the actual source of its malware.
  • Grasshopper – reveal a framework which allowed the agency to easily create custom malware for breaking into Microsoft's Windows and bypassing antivirus protection.
  • Scribbles – a piece of software allegedly designed to embed 'web beacons' into confidential documents, allowing the spying agency to track insiders and whistleblowers.
        

No comments:

Powered by Blogger.