This article is from the source 'rtcom' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at https://www.rt.com/news/384719-wikileaks-vault7-cia-hive/

The article has changed 4 times. There is an RSS feed of changes available.

Version 2 Version 3
‘Top secret CIA virus control system’: WikiLeaks releases ‘Hive’ from #Vault7 series ‘Top secret CIA virus control system’: WikiLeaks releases ‘Hive’ from #Vault7 series
(35 minutes later)
WikiLeaks has released ‘Hive’, the fifth installment in a series of leaks exposing alleged CIA hacking techniques known as ‘Vault 7’. The latest batch consists of six documents and details how the agency can use malware to monitor targets. Hive, the latest batch of WikiLeaks documents exposing alleged CIA hacking techniques from ‘Vault 7’, details how the agency can monitor its targets through the use of malware and carry out specific tasks on targeted machines.
WikiLeaks describes Hive as a “back-end infrastructure malware with a public-facing HTTPS interface,” used to transfer information from machines targeted by the CIA and to allow commands to be communicated in order to execute specific tasks on those machines. Described as a multi-platform malware suite, Hive provides “customisable implants” for Windows, Solaris, MikroTik (used in Internet routers), Linux platforms, and AVTech Network Video Recorders, used for CCTV recording. Such implants allow the CIA to communicate specific commands.
A 2015 User Guide reveals the initial release of Hive came in 2010, and describes the software implant as having two primary functions – a beacon and interactive shell. Both are designed to provide an initial foothold to deploy other “full featured tools.”
The implants communicate via HTTPS with the webserver of a cover domain. Each cover domain is connected to an IP address at a commercial Virtual Private Server (VPS) provider. This forwards all incoming traffic to what’s called a ‘Blot’ server.
The redirected traffic is examined to see if it contains a valid beacon. If it does, it’s sent to a tool handler, known as Honeycomb, where the CIA can initiate other actions on the target computer.
The user guide details the commands that are available, including uploading and deleting files and executing applications on the computer.
To hide the presence of such malware, WikiLeaks notes that the public HTTPS interface (a protocol for secure communication over a computer network within an encrypted connection) “utilizes unsuspicious-looking cover domains,” meaning those targeted would be unaware of the CIA’s interference.To hide the presence of such malware, WikiLeaks notes that the public HTTPS interface (a protocol for secure communication over a computer network within an encrypted connection) “utilizes unsuspicious-looking cover domains,” meaning those targeted would be unaware of the CIA’s interference.
WikiLeaks notes anti-virus companies and forensic experts have noticed “possible state-actor” malware using similar back-end infrastructure, but were unable to connect the back-end to CIA operations. A ‘self-delete’ function is described in documentation accompanying Hive, revealing that the implant destroys itself if it’s not signalled for a predetermined amount of time. Binary information regarding Hive is deleted from the host, leaving a log and configuration file containing only a timestamp.
READ MORE: WikiLeaks ‘hostile intel,’ Assange & his followers ‘demons’: CIA chief goes ballistic The self-delete was known to cause issues for the developers after running into complications caused by disparities in system clocks.
WikiLeaks says anti-virus companies and forensic experts have noticed “possible state-actor” malware using similar back-end infrastructure, but were unable to connect the back-end to CIA operations.
The Hive documents released Friday may allow experts to examine this kind of communication between malware implants and backend servers, WikiLeaks says.The Hive documents released Friday may allow experts to examine this kind of communication between malware implants and backend servers, WikiLeaks says.
The CIA’s Hive project was created by its Embedded Development Branch (EDB). This branch was also responsible for projects detailed in WikiLeaks’ ‘Dark Matter’ leak, revealing the CIA’s attacks on Apple firmware.The CIA’s Hive project was created by its Embedded Development Branch (EDB). This branch was also responsible for projects detailed in WikiLeaks’ ‘Dark Matter’ leak, revealing the CIA’s attacks on Apple firmware.
A 2015 User Guide reveals the initial release of Hive was in 2010, and describes the software implant as having two primary functions a beacon and interactive shell. Both are designed to provide an initial foothold to deploy other “full featured tools.” READ MORE: #Vault7: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products
READ MORE: ‘Brought to you by agency which produced Al-Qaeda & ISIS' – Assange trolls CIA chief