Source:
https://scmp.com/news/world/united-states-canada/article/2084032/wikileaks-release-makes-cia-hacking-operations-easy
World/ United States & Canada

WikiLeaks’ release makes CIA hacking operations easy to spot

The seal of the Central Intelligence Agency at its headquarters in Langley, Virginia. Photo: AP

WikiLeaks’ latest disclosure of CIA cyber tools reveals a technique used by the agency to hide its digital tracks, potentially blowing the cover on current and past hacking operations aimed at gathering intelligence on terrorists and other foreign targets.

I suspect this could cause some foreign policy issues down the road Jake Williams, cybersecurity expert

The release on Friday of the CIA’s “Marble Framework” comes less than a month after the anti-secrecy organisation dumped onto the internet a trove of files – dubbed Vault 7 – that described the type of malware and methods the CIA uses to gain access to targets’ phones, computers and other electronic devices.

“This appears to be one of the most technically damaging leaks ever done by WikiLeaks, as it seems designed to directly disrupt ongoing CIA operations and attribute previous operations,” said Nicholas Weaver, a computer security researcher at the University of California at Berkeley.

The material includes the secret source code of an “obfuscation” technique used by the CIA so its malware can evade detection by antivirus systems. The technique is used by all professional hackers, whether they work for the National Security Agency, Moscow’s FSB or the Chinese military. But because the code contains a specific algorithm, a digital fingerprint of sorts, it can now be used to identify CIA hacking operations that had previously been detected but not attributed.

Documents from WikiLeaks in March, 2016 point to an apparent CIA programme to hack Apple’s iPhones and Mac computers such that the exploits persist even after the devices are reset to factory conditions. Photo: AP
Documents from WikiLeaks in March, 2016 point to an apparent CIA programme to hack Apple’s iPhones and Mac computers such that the exploits persist even after the devices are reset to factory conditions. Photo: AP

“It’s one thing to say, ‘I got hacked.’ It’s another thing to say, ‘I got hacked by the CIA,’” said Jake Williams, founder of Rendition InfoSec, a cybersecurity firm. “I suspect this could cause some foreign policy issues down the road.”

If this source code is used in a majority of CIA hacking operations, Williams said, the release could be “devastating”.

WikiLeaks, founded by Julian Assange, described the Marble Framework as “the digital equivalent of a specialised CIA tool to place covers over the English language text on US produced weapons systems before giving them to insurgents secretly backed by the CIA”.

In releasing the material, WikiLeaks tweeted: “CIA Vault 7 Part 3 ‘Marble’ – thousands of CIA viruses and hacking attacks could now be attributed.”

The agency responded angrily.

“Dictators and terrorists have no better friend in the world than Julian Assange, as theirs is the only privacy he protects,” spokesman Dean Boyd said, without commenting on the authenticity of the release.

“The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the intelligence community’s ability to protect America against terrorists and other adversaries,” Boyd said.

WikiLeaks founder Julian Assange makes a speech from the balcony of the Ecuadorian Embassy, in central London. Photo: Reuters
WikiLeaks founder Julian Assange makes a speech from the balcony of the Ecuadorian Embassy, in central London. Photo: Reuters

“Such disclosures not only jeopardise US personnel and operations, but also equip our adversaries with tools and information to do us harm.’’

WikiLeaks, in its press release, suggested that the obfuscation tool might be used to conduct a “forensic attribution double game” or false flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.

But Williams explained that the tests were to ensure that hacking operations using code written in those languages could be hidden. “If you’re trying to false flag an operation as Chinese, you wouldn’t want to hide those code strings, you’d want everyone to see them,” he said.