My Viral Box Logo
Ad image
  • Funny Stories
  • Weird Stories
  • Scary Stories
  • Ghost Stories
  • Funny Riddles
  • Short Jokes
Reading: Symantec confirms the correspondence between cyber-spy tools of the CIA and that published by WikiLeaks
Share
MYVIRALBOX MYVIRALBOX
Font ResizerAa
  • Funny Stories
  • Weird Stories
  • Funny Riddles
  • Ghost Stories
  • Scary Stories
Search
  • Funny Stories
  • Weird Stories
  • Scary Stories
  • Ghost Stories
  • Funny Riddles
  • Short Jokes
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
MYVIRALBOX > Funny Stories > Symantec confirms the correspondence between cyber-spy tools of the CIA and that published by WikiLeaks
Funny StoriesWeird Stories

Symantec confirms the correspondence between cyber-spy tools of the CIA and that published by WikiLeaks

MVB Staff
Last updated: April 25, 2024 3:36 pm
MVB Staff
Published: April 10, 2017
Share
6 Min Read
SHARE

Symantec

The company Symantec recently published the results of studying the information published by WikiLeaks. It’s about Vault 7, a package of documents describing the principles of the software used by the CIA to break into computers and computer systems of individuals and organizations.

A special group was engaged in cyber espionage in the CIA, which was dubbed Longhorn in Symantec. Its participants infected computer networks of governmental bodies of different countries, telecommunications, energy enterprises as well as aircraft manufacturers were infected. The package of tools, which WikiLeaks representatives stated, was used, according to Symantec, from 2007 to 2011. During this time, the group has modestly at least 40 goals in 16 different states, including the Middle East, Europe, Asia, Africa and the United States (in this case, most likely by mistake).

Longhorn’s instrumentation was very extensive. Symantec succeeded in finding a correspondence between the information provided by WikiLeaks and the attacks carried out in the past, using various methods. This is the coincidence of cryptographic protocols (for example, customized RC5 protocol), changes in the compiler used and methods of attacking computer networks and systems. As it turned out, the company Symantec closely monitored to the best of its ability for the activities of Longhorn in 2014. In any case, it was then that Symantec discovered a new malware distributed in Word documents.

“Longhorn used modern cybernetic tools and zero-day vulnerabilities to defeat targets around the world,” the company said on its blog. “The system of methods, tools and methods used by Longhorn has stood out among others, so there is little doubt that the group is involved in all of these attacks.”

One of the indicators that tracked was Fluxwire. The changes to which the software was exposed correspond to the program described by Symante. Specialists of this company, however, called the corrupted Corentry malware. But it, as far as can be judged, exactly corresponds to the software, which appears in the WikiLeaks archives as FluxWire. For example, the changes in FluxWare documented by WikiLeaks are fully consistent with the Corentry changes that Symantec fixed. If simpler, then this is the same software with specific elements of “behavior”, which is described both by Symantec and WikiLeals. On February 25, 2015, Symantec specialists noted that the developers of this software now use the Microsoft Visual C ++ compiler. The same data is contained in the archive Vault 7.

Much more similar points can be found in the software, which in Vault7 is listed under the name Archangel. On Symantec archives, it passes as Plexor. Specifications and modules of this software are almost equally described in the archives of the CIA and Symantec. There is no doubt that this is also the same program. Vault7 has information on the cryptographic features of the CIA software’s network activity. These features are noted in Symantec.

“Before sending its malware to the target, Longhorn was preconfiguring the software package, traces of which could be detected by specific words, C & C domains and IP addresses that should Was to “communicate” this software. Longhorn used words written in capital letters, often “groupid” and “siteid”, which were used to identify campaigns and victims. More than 40 such identifiers were studied, very often they were words from films, including characters, food or music. One example is the reference to the group “The Police”, with the code words REDLIGHT and ROXANNE, “says the report of experts from Symantec.

WikiLeaks published the first part of the collection of secret documents of the CIA on March 8. This collection, called Vault 7, gives a good idea of ​​the scale of the cyberspace work of this organization. With the help of programs developed by its employees, the CIA was able to penetrate the computer networks of virtually any organization. After the promulgation of these documents, it became clear that the capabilities of the CIA are superior to those of the NSA.

Now WikiLeaks does not publish the source code of the tools, information about which is contained in the first part of the archive. This is done for various reasons, including the danger of getting such information in the hands of cybercriminals.

Well, the CIA reaction is quite natural. “As we said earlier, Julian Assange is not at all a bastion of truth and honesty. American society should be deeply moved by the disclosure of Wikileaks documents, which leads to a limitation of the CIA’s ability to protect America from terrorists and other intruders, “the press secretary of the department said.

MVB Staff
MVB Staff

You Might Also Like

Catch us if you can / Geektimes
Michigan Lottery: Woman Logs in to Find $25,000 a Year for Life Prize!
Published by the CIA user’s manual for remote TV monitoring Samsung
Robots in the industry – their types and varieties / Blog of the company Top 3D Shop / Geektimes
Possibly domestication of modern wolves / Geektimes
Leave a Comment Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search Posts

‎‎‎‎‎Explore Our Categories

  • Funny Riddles9
  • Funny Stories526
  • Ghost Stories3
  • Scary Stories22
  • Short Jokes1
  • Weird Stories481
Ad image

Latest added

scary vacation
Scary Stories

7 Scary Vacation Stories That Really Happened

June 13, 2025
buy weird stuff
Weird Stories

When Lottery Winners Buy Weird Stuff: 13 Intriguing Stories

June 10, 2025
best scary movies of all time
Scary Stories

15 Best Scary Movies of All Time: A Guide to Horror Classics

June 6, 2025
funny movies about luck
Funny Stories

Laugh Out Loud: The Best Funny Movies About Luck

June 2, 2025
weird cricket
Weird Stories

Weird Cricket Moments: A Fun Look at the Strange Side of the Game

May 31, 2025
funny questions to ask
Funny Stories

120 funny questions to ask to spark laughter and break the ice

May 23, 2025

Explore More

  • Privacy Policy
  • Submit Your Silly Stories

Follow US on Social Media

Facebook Instagram Pinterest Envelope-open

My Viral Box Logo

About My Viral Box

MyViralBox brings together all the weird, wacky, scary and funny news from around the web in one place to brighten your day. You might scratch your head; you might laugh out loud; you might glance over your shoulder; but you’re gonna have fun whenever you drop by. Funny news, weird news, chill-inducing spookiness, jokes and riddles of all kinds, plus whatever else we come across that we think just has to go viral; you’ll find it all right here!

© My Viral Box. All Rights Reserved.

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?