WIKILEAKS HAS published code and documents detailing Hive, the control component for the CIA's vast suite of malware, in the latest release from the Vault7 cache of US intelligence agency malware.
The CIA also, the documents suggest, faked Kaspersky and Thawte digital certificates in order to mask some of its dodgy activities from targets.
It is now, of course, only a matter of time before every last ne'er do well in the world incorporates nastiest techniques into their own malware in a WannaCry-stylee.
"Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention," explains Wikileaks.
It continues: "Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet.
Wikileaks is now releasing source for exploits in Vault 7. Do they remember what happened last time such exploit code was leaked? Standby for another wannacry.— Alan Woodward (@ProfWoodward) November 9, 2017
"Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
"Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. "perfectly-boring-looking-domain.com") for its own use.
"The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customised according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a ‘hidden' CIA server."
The cover domain delivers 'innocent' content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website, explains Wikileaks. However, for someone perusing the website with a machine infected with CIA malware will authenticate in the background.
"Traffic from [malware] implants is sent to an implant operator management gateway called Honeycomb while all other traffic go to a cover server that delivers the non-suspicious content for all other users."
Furthermore, Wikileaks reveals, the CIA faked digital certificates from Kaspersky and Thawte in order to try and mask the malicious activity.
"Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server Certificate Authority, Cape Town." µ
Slack, hack and crack
A flaw in the protocol affects iOS, macOS and Windows 10
Wig wearer has issue with non-wig-wearer