Week 6. Are Malware Threats or Tools?



When hearing the term virus, spyware, malware, adware you may think of hackers or crackers.  Think again!  To the public eyes, government agencies such as CIA are just as bad as those hackers that you are thinking of.  Their goals may be different, but the act is the same.  WikiLeaks, for the last few months, exposed some evidence of malware, backdoors, spyware, and trojans that the CIA has used.  Here are just a few from the website.

Dark Matter - A firmware malware that targets Apple Mac and iPhones.  Once infected, the malware cannot be removed even when the OS is reinstalled.  The purpose for this malware is unknown.
Hive - malware that targets servers and provides  HTTPs interface to the outside.  It is used by the remote machine for extracting information and remote command.

Weeping Angel - an audio recording program.  Once infected the host, it uses the microphone to record audio and either send it out or store the data to be retrieved later.

Archimedes - a computer program that can redirect the web data from the infected computer to a different server.   In a sense, I believe it uses a technic called man-in-the-middle attack.  Although it is claimed that the program is used within the Local Area Network (LAN), it may not do just that in my opinion.  

AfterMidnight - a computer malware or a web server to be more precise.  Once get on the target machine it opens a HTTPS port listening for instruction from outside.  In a sense, this malware more or less acts as a scheduled worker.  At a scheduled time, it listens to command and execute the request sent from another location.

Athena - a Windows XP and later malware that allows remote control of configuration, operation, and task on the infected computer.

Elsa - A location tracking program that obtains and logs information about WiFi access points as well as geographical location of the device.  It is installed on the target machine either by the user or exploits.

Just like a gun, knife, or bow, malware, rootkit, backdoors are just tools.  When we use them to cause harm, they become weapons.  Otherwise, they are merely just tools.  How do you know when they are used as tools and when are they used as weapons?  You don't!  
  
Trust no one!

Source:
https://wikileaks.org/vault7

Comments

Popular posts from this blog

Week 10 - STRIDE: Elevation of Privilege

Week 7 - STRIDE: Repudiation

Week 8. Secure Your Credit Cards