Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 1 of 1
Like Tree1Likes
  • 1 Post By Tulim

Thread: Wikileaks Uncovers Top Secret CIA Virus Control System “Hive”

  1. #1
    Tulim
    Guest Tulim's Avatar

    Wikileaks Uncovers Top Secret CIA Virus Control System “Hive”

    [SIZE=2]The non-profit whistleblower Wikileaks has published 6 new documents disclosing information about Hive, a back-end infrastructure used to manage CIA implants. It is used to transfer data collected by implants to CIA and ask the implant to run specified commands. A public HTTPS interface is used to hide Hive in plain site.
    Another Friday passed on April 14 and Wikileaks dropped another stack of Vault 7 documents in the wild. CIA is really pissed off at Wikileaks by now and it’s clear from CIA director’s mindset. The latest leak includes 6 new documents revealing a CIA project called Hive.

    Before you read further, you might want to go take a refresher of the Vault 7 stories happened till now:
    Link to Longhorn

    - 40 Cyber Attacks Now Link To CIA Hacking Tools Uncovered By Wikileaks

    Grasshopper Framework

    - Wikileaks Releases “How To Hack Windows” Secret Guide By CIA

    Marble Framework

    - Wikileaks’ Most “Technically Damaging” Leak Reveals CIA Source Code That’s Hides Identity Traces From Malware

    Dark Matter

    - Everything You Need To Know About WikiLeaks’ Release –Windows, iPhone, Linux, Android, Mac, WhatsApp and Telegram Messages, TVs, Routers, And Modern Cars Are Hackable By CIA

    - WikiLeaks Publishes “CIA’s Entire Collection Of Hacking Tools”

    Hive is basically a back-end infrastructure designed by CIA to keep an eye on their malware implants out there in the wild. According to Wikileaks, it’s used by “CIA implants to transfer exfiltrated information from target machines to the CIA and to receive commands from its operators to execute tasks on targets.”

    A surprising thing about the Hive malware control system is that it purports to have an HTTPS interface, taking advantage of “unsuspicious-looking cover domains to hide its presence.”

    Image: Hive Test Infrastructure

    The user guide included in the documents describes two primary Hive functions as “beacon” and “interactive shell”. It further says that the functions, “limited in features”, behave like a launchpad for other “full featured tools.”

    Hive provides implants for various CPU architectures and operating systems, including Windows (XP, Server 2000/2003), Linux x86, Solaris, Mikrotik, etc.

    The release of the documents related to Hive also facilitates the missing string to a recent finding by Symantec researchers. Although, not naming directly, they were able to link 40 cyber attacks conducted by Longhorn to CIA after analyzing the Vault 7 documents.

    They indicated the possibility of a “nation-state attacker” behind such attacks, considering the type of organizations targeted. Now, according to Wikileaks, the back-end infrastructure described in Hive documents resembles the one mentioned by Symantec researchers in their blog post.

    source: https://fossbytes.com/vault-7-cia-hive-wikileaks/
    Last edited by ; 04-15-2017 at 02:56 PM.
    jimmy7 likes this.


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •