Week 6. Are Malware Threats or Tools?
When hearing the term virus, spyware, malware, adware you
may think of hackers or crackers. Think
again! To the public eyes, government
agencies such as CIA are just as bad as those hackers that you are thinking of. Their
goals may be different, but the act is
the same. WikiLeaks, for the last few
months, exposed some evidence of malware, backdoors, spyware, and trojans
that the CIA has used. Here are just a
few from the website.
Dark Matter - A firmware malware that targets Apple Mac and iPhones. Once
infected, the malware cannot be removed even when the OS is reinstalled. The purpose for this malware is unknown.
Hive - malware that targets
servers and provides HTTPs interface to
the outside. It is used by the remote machine for extracting information and
remote command.
Weeping Angel - an audio recording program. Once infected the host, it uses the microphone to record audio and either
send it out or store the data to be retrieved
later.
Archimedes - a computer
program that can redirect the web data
from the infected computer to a different
server. In a sense, I believe it uses a technic called man-in-the-middle
attack. Although it is claimed that the program is used within the Local Area Network (LAN), it
may not do just that in my opinion.
AfterMidnight - a computer malware or a web server to be
more precise. Once get on the target machine it opens a HTTPS port listening for instruction
from outside. In a sense, this malware more or less acts as a scheduled worker. At a scheduled time, it listens to command and execute the request sent from another location.
Athena - a Windows XP and later malware that allows remote
control of configuration, operation, and
task on the infected computer.
Elsa - A location tracking program that obtains and logs information about WiFi access
points as well as geographical location of the device. It
is installed on the target machine either by the user or exploits.
Just like a gun,
knife, or bow, malware, rootkit, backdoors
are just tools. When we use them to
cause harm, they become weapons. Otherwise, they are
merely just tools. How do you know when
they are used as tools and when are they used as weapons? You don't!
Trust no one!
Source:
https://wikileaks.org/vault7
Comments
Post a Comment