Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Software Government Operating Systems Privacy Security United States

WikiLeaks Dump Reveals CIA Malware That Can Sabotage User Software (bleepingcomputer.com) 116

An anonymous reader writes: "While the world was busy dealing with the WannaCry ransomware outbreak, last Friday, about the time when we were first seeing a surge in WannaCry attacks, WikiLeaks dumped new files part of the Vault 7 series," reports BleepingComputer. This time, the organization dumped user manuals for two hacking tools named AfterMidnight and Assassin. Both are malware frameworks, but of the two, the most interesting is AfterMidnight -- a backdoor trojan for stealing data from infected PCs. According to its leaked manual, AfterMidnight contains a module to "subvert" user software by killing processes and delaying the execution of user software. Examples in this manual show CIA operatives how to kill browsers every 30 seconds to keep targets focused on their work, how to delay the execution of PowerPoint software with 30 seconds just to mess with their targets, or how to lock up 50% of PC resources whenever the user starts certain software. Basically, the CIA created nagware.
This discussion has been archived. No new comments can be posted.

WikiLeaks Dump Reveals CIA Malware That Can Sabotage User Software

Comments Filter:
  • 50% usage (Score:5, Funny)

    by Anonymous Coward on Tuesday May 16, 2017 @07:09AM (#54425123)

    how to lock up 50% of PC resources whenever the user starts certain software

    Isn't that just windows updates?

    • by rfengr ( 910026 )
      I only wish. My home PC runs fine. The one at work is a dog, despite being brand new dual Xeon. Corporate IT has a way of destroying anything.
      • Corporate IT has a way of destroying anything.

        Agreed. I've bought surplus work computers, and they went from being dogs that took 10 minutes to boot, to being decent systems.

    • No problem here... maybe a CIA operative is messing with you.

    • how to lock up 50% of PC resources whenever the user starts certain software

      Isn't that just windows updates?

      Even worse.

      Microsoft could consider this activity patent infringement. Guess it's good the government isn't easily sued...

    • by Anonymous Coward

      how to lock up 50% of PC resources whenever the user starts certain software

      Isn't that just windows updates?

      Nope. A certain Antivirus did that too; and probably still does AFAIK.

  • to kill browsers every 30 seconds to keep targets focused on their work

    As a web programmer, I need tons of documentation that is mainly available on-line. If I got the CIA's luddite infection, I couldn't deliver much useful

  • by Anonymous Coward on Tuesday May 16, 2017 @07:28AM (#54425183)

    Powerpoint gets delayed 30 secs... and so on.

    Isn't that just standard Windows "user experience" anyway?

  • If you feel left out, you can simply install some anti-virus software.
  • Windows (Score:4, Funny)

    by coofercat ( 719737 ) on Tuesday May 16, 2017 @07:43AM (#54425257) Homepage Journal

    I thought Windows was just like that by default - little did I know I was being hacked by the CIA. I'll be more careful in future ;-)

  • by Mouldy ( 1322581 ) on Tuesday May 16, 2017 @07:43AM (#54425259)
    Anyone else a bit disappointed by the sophistication of the tools & docs wikileaks are releasing?

    If this is the extent of the CIA's super-impressive cyber capabilities, then the tax payers probably deserve a refund.

    The difficult/expensive bit are the zero day exploits & getting nafarious/nagging code onto a target system & running with sufficient privileges.

    Finding a hole in an EOL OS like windows XP or social engineering someone to install something that kills powerpoint every 30 seconds probably isn't worth the millions (billions?) of dollars thrown into these programs by the government.

    Maybe I've just seen too many spy movies, but I kind of expected something a bit more exotic.
    • by Mal-2 ( 675116 )

      Maybe I've just seen too many spy movies, but I kind of expected something a bit more exotic.

      Even hundred-million-dollar robots need the application of $1 screwdrivers now and again. Sometimes it takes a tool that costs as much as a car to service a car, while other times it only requires a $10 cable and a laptop you already have. I'm not surprised that the surveillance state uses both expensive tools and cheap ones, since almost every other endeavor does the same.

    • Why do you think these are the tools that much money goes towards? If some other spy agency took these tools in the first place, they'd probably keep the really cool ones rather than give them to Wikileaks.

    • by AHuxley ( 892839 )
      The CIA malware is focused at average users in front of an average Windows computer.
      Expecting average, tame, consumer grade antivirus products that don't work on average computers.
      This is not an average OS X or Linux user with an outgoing firewall that has a nice gui to show new connections and lots of third party software looking for any changes to OS folders, files in real time.
      Nothing is watching for persistently installed software or looking at persistence locations for OS changes.

      Octopus and Gre
  • Is this why WoW gets slower with every release?

    • Is this why WoW gets slower with every release?

      It's the reason all raid fights have to fit into a 30 second window now.

  • So they are passing out weapons now. Lots of international law about that. Most of it very nasty.
  • i would assume the worst, totally wipe windows off the drive, do a clean install without allowing windows internet access, reboot my dual boot system to Linux and then wait for the shitstorm to subside and then maybe boot up windows for offline only purposes and use Linux for a general purpose internet access OS
  • Let it be a lesson (Score:5, Interesting)

    by OneHundredAndTen ( 1523865 ) on Tuesday May 16, 2017 @09:05AM (#54425633)
    To all those who keep looking forward to the year of Linux in the desktop - don't. The status quo is excellent. You can run Linux in the desktop without any problems and without much effort, if you want to, to do just about everything that you need and want. As long as Windows maintains its stranglehold, the bad guys and three letter government agencies world over will focus their efforts on Windows, leaving Linux desktops alone. The time has come to understand that the dominance of Windows in the desktop is a blessing to those of us who wish to run Linux in the desktop. We do not want for Linux to rule in the desktop, we want for Windows to carry on taking the heat. Fortunately, the asinine efforts behind Gnome and KDE (and the fading Unity) almost guarantee that Windows will remain the desktop of choice for the masses. And that is a very good thing for the rest of us.
    • by ruir ( 2709173 )
      After the systemd fiasco, for me is the year of FreeBSD in the desktop...Actually it is so much easier to setup wifi, for instance...
  • by ytene ( 4376651 ) on Tuesday May 16, 2017 @09:09AM (#54425661)
    I'm not sure about other readers, but one of the things I've noticed is that as time passes, so more and more potentially useful software becomes "chatty" - in other words software that we'd normally trust to do "what it says on the tin" and nothing else has suddenly sprouted a great deal of extra activity.

    This makes it much harder to spot suspicious activity on "ordinary" machines.

    Now, we have to accept that there is a great deal of "free" software available today (firewall software like ZoneAlarm, anti-virus software like AVG) which offer both free and paid-for versions, but for which the free-to-use editions "phone home" an extraordinary amount of data about your PC. You get what you pay for.

    But when your OS is the worst offender, (W10), when your video driver maintains a running commentary (nVidia), when almost any piece of software on your computer believes that it has the need or right to "phone home", it becomes orders of magnitude more difficult to understand when something suspicious might be happening with your computer. I recently had to re-install a Windows 10 machine for a friend of mine; after applying a 3rd-party firewall utility and configuring it to block all outbound traffic until it had been positively vetted, I was absolutely stunned by the number of different packages that claimed the need to "phone home".

    I am sure there are many legitimate reasons for this to happen [such as checking for updates]. However, the current state of affairs seems to be stacking the odds against the average user. It's a bit like the tic-tac-toe ending to Wargames: the only way to avoid losing is to not play the game... and the only way to avoid having your PC pwned is to not have a PC in the first place.

    OK, that's a [small] exaggeration. But it illustrates the point. #Depressing.
    • by ruir ( 2709173 )
      Tell me about chatty...I wonder if any operating system would ever have the common sense of not stealing the focus of apps, at least if the user has been using the keyboard and mouse in the last couple of minutes.
      • by ytene ( 4376651 )
        Oh yes - and especially when the software wants to get you to agree to an update, and cheerfully interrupts a full-screen gaming session to agree to an update.

        Software vendors: there are plenty of opportunities and ways that you can let me know that I need to give your software product my attention - for example causing the menu bar icon to flash. Taking control of my PC and switching to your product is NOT an acceptable mechanism. I will replace and remove software that does this. Which is why 95% of my
        • by ruir ( 2709173 )
          I migrated out of linux decades ago, and nowadays starting the process of migrating out of OSX for *BSD.
    • and the only way to avoid having your PC pwned is to not have a PC in the first place.

      Or not to use Windows...

  • Cant Microsoft sue for infringement about selling malware that can sabotage user software?
    • Suing over trivial and frivolous design patents is Apple's business model. Microsoft might be able to license the technology from them.
      • by ruir ( 2709173 )
        Last time I looked the crappy software is on the MS side, so Apple cannot properly sue about that...MS is known to be shady enough to fund trolls for them to sue other companies, partly also because it had several run ins with the DoJ in the past.
        Both situation are pretty well documented, and you know, someone invented something called Google...
      • by ruir ( 2709173 )
        Hmmm....you comment history just indicates you are an idiot or a wanna be troll....
  • by Kardos ( 1348077 ) on Tuesday May 16, 2017 @10:44AM (#54426385)

    ... this raises the possibility that Windows might actually be a functional and performant piece of work, one that has been unfairly maligned over the years due to the CIA's actions!

  • That's not nagware. Stop with the self-righteous software vigilantiism.

    Children.

  • The blog or and best that is extremely useful to keep I can share the ideas of the future as this is really what I was looking for, I am very comfortable and pleased to come here. Thank you very much. animal jam [animaljam-2.com] | five nights at freddy's [fivenights...ddys-2.com] | hotmail login [hotmailemaillogin.net]

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...