• all red air force ones tumblr[2017-11-22]
  • wedge sneaker japan[2017-11-22]
  • nike sb blazer pacman[2017-11-22]
  • toddler girl nike shirts[2017-11-22]
  • nike sb dunk high chairman bao for sale[2017-11-22]
  • nike wmns 2015 benassi jdi qs[2017-11-22]
  • running shoe store us[2017-11-17]
  • nike air force 90[2017-11-17]
  • bridal shoes with crystals[2017-11-17]
  • nike-dunk-hi-top-boot-sneakers[2017-11-17]
  • nike jordans tumblr[2017-11-17]
  • nike free og paris[2017-11-17]
  • nike boxing 2018[2017-11-17]
  • shoes online nike air max[2017-11-17]
  • air jordan retro ii[2017-11-17]
  • mens nike plus trainers[2017-11-17]
  • nike air force mid pink[2017-11-17]
  • nike black quarter socks[2017-11-17]
  • nike free trainer 3.0 teal[2017-11-17]
  • lebron 6 elite qs[2017-11-17]
  • WikiLeaks drama alert: CIA forged digital certs imitating Kaspersky Lab

    Vault 8 release says spooks used disguise to siphon off data

    spies_648

    The CIA wrote code to impersonate Kaspersky Labs in order to more easily siphon off sensitive data from hack targets, according to leaked intel released by Wikileaks on Thursday.

    Forged digital certificates were reportedly used to "authenticate" malicious implants developed by the CIA. Wikileaks said:

    Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.

    Eugene Kaspersky, chief exec of Kaspersky Lab, sought to reassure customers. "We've investigated the Vault 8 report and confirm the certificates in our name are fake. Our customers, private keys and services are safe and unaffected," he said.

    Hackers are increasingly abusing digital certs to smuggle malware past security scanners. Malware-slinging miscreants may not even need to control a code-signing certificate. Security researchers from the University of Maryland found that simply copying an authenticode signature from a legitimate file to a known malware sample – which results in an invalid signature – can result in antivirus products failing to detect it.

    Learn client-server C programming – with this free tutorial from the CIA

    READ MORE

    Independent experts reckon the CIA used Kaspersky because it's a widely known vendor.

    Martijn Grooten, security researcher and editor of industry journal Virus Bulletin, said: "The CIA needed a client certificate to authenticate its C&C comms, couldn't link it to CIA and used 'Kaspersky', probably just because they needed a widely used name. No CA hacking or crypto breaking involved. Clever stuff, but not shocking. Not targeted against Kaspersky."

    Revelations about the abuse of digital certificates by the US spy agency came as Wikileaks released CIA source code and logs for a malware control system called Hive, as previously reported.

    Security expert Professor Alan Woodward criticised the release with a reference to the Equation Group (NSA hacking unit)/Shadow Brokers leak. "Wikileaks is now releasing source for exploits in Vault 7. Do they remember what happened last time such exploit code was leaked? Standby for another WannaCry." ?


    Biting the hand that feeds IT ? 1998–2017