Advertisement
WikiLeaks
WorldUnited States & Canada

WikiLeaks’ release makes CIA hacking operations easy to spot

Reading Time:2 minutes
Why you can trust SCMP
The seal of the Central Intelligence Agency at its headquarters in Langley, Virginia. Photo: AP
The Washington Post

WikiLeaks’ latest disclosure of CIA cyber tools reveals a technique used by the agency to hide its digital tracks, potentially blowing the cover on current and past hacking operations aimed at gathering intelligence on terrorists and other foreign targets.

I suspect this could cause some foreign policy issues down the road
Jake Williams, cybersecurity expert

The release on Friday of the CIA’s “Marble Framework” comes less than a month after the anti-secrecy organisation dumped onto the internet a trove of files – dubbed Vault 7 – that described the type of malware and methods the CIA uses to gain access to targets’ phones, computers and other electronic devices.

“This appears to be one of the most technically damaging leaks ever done by WikiLeaks, as it seems designed to directly disrupt ongoing CIA operations and attribute previous operations,” said Nicholas Weaver, a computer security researcher at the University of California at Berkeley.

The material includes the secret source code of an “obfuscation” technique used by the CIA so its malware can evade detection by antivirus systems. The technique is used by all professional hackers, whether they work for the National Security Agency, Moscow’s FSB or the Chinese military. But because the code contains a specific algorithm, a digital fingerprint of sorts, it can now be used to identify CIA hacking operations that had previously been detected but not attributed.

Advertisement
Documents from WikiLeaks in March, 2016 point to an apparent CIA programme to hack Apple’s iPhones and Mac computers such that the exploits persist even after the devices are reset to factory conditions. Photo: AP
Documents from WikiLeaks in March, 2016 point to an apparent CIA programme to hack Apple’s iPhones and Mac computers such that the exploits persist even after the devices are reset to factory conditions. Photo: AP

“It’s one thing to say, ‘I got hacked.’ It’s another thing to say, ‘I got hacked by the CIA,’” said Jake Williams, founder of Rendition InfoSec, a cybersecurity firm. “I suspect this could cause some foreign policy issues down the road.”

Advertisement

If this source code is used in a majority of CIA hacking operations, Williams said, the release could be “devastating”.

WikiLeaks, founded by Julian Assange, described the Marble Framework as “the digital equivalent of a specialised CIA tool to place covers over the English language text on US produced weapons systems before giving them to insurgents secretly backed by the CIA”.

Advertisement
Select Voice
Choose your listening speed
Get through articles 2x faster
1.25x
250 WPM
Slow
Average
Fast
1.25x