Pages

28 June 2017

*** WIKILEAKS: THE CIA CAN REMOTELY HACK INTO COMPUTERS THAT AREN’T EVEN CONNECTED TO THE INTERNET


When firewalls, network-monitoring services, and antivirus software aren’t enough, there’s always been one surefire way to protect computers that control sensitive operations like power grids and water pumps: cut them off from the internet entirely. But new documents published by WikiLeaks on June 22 suggest that even when such extreme measures are taken, no computer is safe from motivated, well-resourced hackers.


The 11 documents describe a piece of software called “Brutal Kangaroo,” a set of tools built for infiltrating isolated, “air-gapped” computers by targeting internet-connected networks within the same organization. It’s the latest publication in the “Vault 7” series of leaked documents, which describe myriad hacking tools WikiLeaks says belong to the US Central Intelligence Agency (CIA).


Brutal Kangaroo works by creating a digital path from an attacker to an air-gapped computer and back. The process begins when a hacker remotely infects an internet-connected computer in the organization or facility being targeted. Once it has infected that first computer, what the documents refer to as the “primary host,” Brutal Kangaroo waits. It can’t spread to other systems until someone plugs a USB thumb drive into that first one.

Once someone does, malware specific to the make and model of the thumb drive is copied onto it, hiding in modified LNK files that Microsoft Windows uses to render desktop icons, and in DLL files that contain executable programs. From this point, Brutal Kangaroo will spread further malware to any system that thumb drive is plugged into. And those systems will infect every drive that’s plugged into them, and so on, and the idea is that eventually one of those drives will be plugged into the air-gapped computer.

The major flaw in the concept of isolating sensitive computers is that the air gap around them can only be maintained if no one ever needs to copy files onto or off of them. But even for specialized systems, there are always updates and patches to install, and information that has to be fed in or pulled out. It’s common knowledge among IT specialists that external hard drives are an obvious target for anyone seeking to break the air gap, and precautions are presumably taken in facilities with diligent IT specialists. Those precautions, however, can be subverted with exploitations of obscure vulnerabilities, and sometimes mistakes simply happen.

If a thumb drive infected with Brutal Kangaroo is plugged into an air-gapped computer, it immediately copies itself onto it. If a user tries to browse the contents of the infected drive on that computer, it will trigger additional malware that will collect data from the computer. As users continue plugging the drive into connected and disconnected computers, a relay is formed, ultimately creating a slow path back to the hacker, through which data copied from the air-gapped computer will be delivered if everything goes according to plan.

Many details described in the Brutal Kangaroo documents have drawn comparisons to Stuxnet, the powerful malware reportedly developed by the US and Israel to sabotage Iran’s nuclear program. Stuxnet was specifically built to target air-gapped computers that controlled centrifuges in an Iranian nuclear facility. The attackers in that case did not target an internet-connected network within the nuclear facility, presumably because there wasn’t one, but instead targeted five outside organizations, according to a 2014 report in Wired. From there, however, the attack worked in much the same way as the methods described in the Brutal Kangaroo documents: Stuxnet also spread through thumb drives, hid in LNK files, and attempted to create a relay to send information back to the attackers.

Stuxnet was eventually discovered by security researchers because it was too powerful, and spread to far more computers than its creators apparently wanted it to. The developers of Brutal Kangaroo appear to have taken a lesson from that, and described several checks in their documents that will stop it from spreading if certain factors are met. Every time it lands on a new computer, Brutal Kangaroo first checks the computer’s date. If it is past a date hard-coded into the malware, “the program will immediately exit,” according to the documents. It also checks some sort of “black list,” and will quit if the computer is on it. It will also quit Brutal Kangaroo “if the computer had been seen before.”

The Brutal Kangaroo documents are only the latest revelation about what the CIA’s hackers are allegedly capable of. Previous Vault 7 publications have included documents that suggest the agency can turn smart TVs into listening devices, hack various desktop and mobile operating systems, and monitor internet traffic by breaking into home wifi routers. In April, Symantec matched several tools described in the releases to invasive software it had been tracking since 2014. That malware had infected at least 40 targets in 16 countries since 2011, the company said in a blog post, and was possibly active as far back as 2007.

The CIA has not confirmed its ownership of the documents or tools, but as Motherboard pointed out last March, US officials said in court that the documents contain classified information, suggesting that the leaks are in fact authentic.

Jak informuje fortunascorner.com: CIA może infiltrować komputery bez dostępu do Internetu. Mechanizm o nazwie „Brutal Kangaroo” zakłada zainfekowanie maszyny z dostępem do Internetu, a następnie z jej pomocą stworzenie „ścieżki cyfrowej” w ramach wewnętrznej sieci firmowej do docelowego urządzenia. […] 

The Backbone of the US Government’s Internet of Things (IoT) is the NSA Smoke Detector Spy Net – All Smoke Detectors in the US were mandated to be replaced after 9/11, while at the same time the CIA worked with Technology Companies to mandate Government Grade Wi/Fi type “Chips” be installed in all new modern Technology, including all new “Appliances and Devices” – this includes Computers, TVs, Monitors, Cell Phones, Tablets, etc. These “Appliances and Devices” have “Chips” that connect to Smoke Detectors! The Electromagnetic Frequency (EF) they use is a Government Only EF Signal, so it does not operate on the same EF Signals available in the Private Sector, and is only allowed to be used by the Government. So, even if you are not connected to the Internet through your own personal connection, all of your modern technology seamlessly connects to the Government’s Internet of Things, and everything you do on the computer can be seen and heard!

AND! That’s not all, because each Smoke Detector is broadcasting a Unique Microwave Frequency, while simultaneously receiving signals from other Smoke Detectors within its vicinity, these Microwave Signals can be “Turned into Cameras” – Thats right, through the use of “Triangulation,” and Supercomputers, the Microwave Signals can be used to build virtual cameras and the All Seeing Eye is real! And with the Smoke Detectors sending all the information back to the NSA through Cell Phone Towers, other receivers and even Satellites, the logs can be recorded and stored and the Operators can look back as long as the logs and the “Sensor Grid” has been in place!

No comments:

Post a Comment