Symantec Links 40 Cyber Attacks to CIA Hacking Tools Revealed by WikiLeaks

Investigations Uncover CIA Hacking Tools Linked to Global Cyber Attacks

Recent analyses have confirmed that the CIA hacking tools revealed by WikiLeaks have been deployed against a range of targets, specifically 40 governments and private organizations across 16 countries. This unsettling revelation comes from ongoing investigations into the documents leaked in the “Vault 7” series by WikiLeaks, which has published over 8,761 documents alleging covert operations by the U.S. Central Intelligence Agency (CIA).

Cybersecurity firm Symantec reported that it has established connections between these CIA tools and a variety of cyber attacks conducted against entities in both government and private sectors globally. Notably, the hacking group known as Longhorn is believed to be behind these operations. Active since at least 2011, Longhorn has focused its attacks on a wide array of industries, including government, finance, energy, telecommunications, education, aerospace, and natural resources.

This group’s activities have primarily targeted regions in the Middle East, Europe, Asia, and Africa. Interestingly, there was one incident involving an unintentional malware infection in the United States, which was resolved within an hour when the victim initiated an uninstaller to remove the malware. The evidence linking these attacks to the CIA tools raises concerns regarding state-sponsored cyber espionage.

Analysis from Symantec demonstrates overlapping functionalities between CIA tools and Longhorn’s cyber operations. For instance, the CIA-developed malware Fluxwire, which appears in the Vault 7 documents, shares a development timeline with Corentry, a tool attributed to Longhorn. All versions of Corentry prior to 2014 were compiled using the GNU Compiler Collection, while Fluxwire transitioned to using Microsoft Visual C++ in 2015, mirroring updates seen in Longhorn’s coding practices.

Another noteworthy document from the Vault 7 revelations highlights specifications for payload characteristics and loading mechanisms that closely align with a Longhorn backdoor known as Plexor. This type of alignment in tactics suggests a level of sophistication that is characteristic of state-sponsored hacking groups, particularly as both entities exhibit similar cryptographic protocols.

Symantec’s research indicates a methodical approach by Longhorn, reflecting behaviors typical of professional hacking groups operating on set hours, likely within a North American time zone. The functionality of Longhorn’s malware includes advanced system fingerprinting, discovery, and data exfiltration, all while maintaining stealth to avoid detection.

Moreover, the operations of Longhorn are characterized by the use of coded language and references that suggest its English-speaking origins, underscoring the potential involvement of state-sponsored efforts in its activities. The precise linkages drawn from Symantec’s investigation emphasize the overlap between Longhorn’s will and the capabilities inferred from the leaked CIA documents.

Overall, the implications of these findings resonate deeply across the cybersecurity landscape. For business owners, the scenarios depicted underline the importance of understanding potential adversarial tactics such as initial access, persistence, and privilege escalation, as outlined in the MITRE ATT&CK framework. This case serves as a cautionary tale, highlighting the ongoing threats posed by sophisticated hacking groups and the potential ramifications for organizations worldwide.

As the cybersecurity landscape continues to evolve, staying informed and prepared against such tactics is essential for safeguarding sensitive information and maintaining operational integrity.

Source link