Senators want spies to disclose more about secret zero-day policy

The Senate Intelligence Committee hopes to learn more about how American spies handle the disclosure of software vulnerabilities continuously discovered by the U.S.’ 16 spy agencies, which are occasionally used as a weak point to hack into computer networks, according to the recently released 2018 Intelligence Authorization Act. While the law calls for greater transparency, former senior U.S. officials say it begs the wrong questions. The specific provision, which is just one part of the Senate committee’s annual legislative agenda, comes in the aftermath of multiple leaks of classified information; providing in some cases the computer code behind a toolbox of outdated NSA and CIA hacking capabilities. These exposures have already led to the adoption of several different, U.S. government-linked hacking tools by cyber criminals and foreign spy powers. The proliferation of this code was responsible for a recent, global outbreak of ransomware that subsequently caused millions of dollars in […]

The post Senators want spies to disclose more about secret zero-day policy appeared first on Cyberscoop.

Continue reading Senators want spies to disclose more about secret zero-day policy

WikiLeaks: CIA’ CouchPotato Tool Remotely Collects Video Streams

By Carolina

WikiLeaks has released yet another CIA hacking tool as part

This is a post from HackRead.com Read the original post: WikiLeaks: CIA’ CouchPotato Tool Remotely Collects Video Streams

Continue reading WikiLeaks: CIA’ CouchPotato Tool Remotely Collects Video Streams

SSH inventor analyzes tools the CIA wrote to exploit his protocol

The CIA hacking tools called Gyrfalcon and BothanSpy, as described in documents released by anti-secrecy group WikiLeaks, are “effective, but surprisingly unsophisticated,” according to Tatu Ylonen. And he should know — he invented the security protocol they exploit. In a blog post he published Wednesday, Ylonen — inventor of the Secure Shell or SSH security protocol — analyzes the descriptions of the tools provided by WikiLeaks. The group, which has not released the source code for the exploits, published classified “user guides” for the two tools earlier in July as part of a trove of stolen documentation about CIA hacking tools they’ve dubbed Vault 7. “From the [documents], it is easy to figure out how they work,” Ylonen told CyberScoop of the exploits, which are designed to let hackers move around an IT network once they’ve compromised a single machine. In an interview, he speculated they probably would have taken “a few weeks of work” to develop, […]

The post SSH inventor analyzes tools the CIA wrote to exploit his protocol appeared first on Cyberscoop.

Continue reading SSH inventor analyzes tools the CIA wrote to exploit his protocol

WikiLeaks Reveals CIA Teams Up With Tech to Collect Ideas For Malware Development

As part of its ongoing Vault 7 leaks, the whistleblower organisation WikiLeaks today revealed about a CIA contractor responsible for analysing advanced malware and hacking techniques being used in the wild by cyber criminals.

According to the document… Continue reading WikiLeaks Reveals CIA Teams Up With Tech to Collect Ideas For Malware Development

WikiLeaks’ Latest Dump Exposes CIA Hacking Tools for air-gapped PCs

By Jahanzaib Hassan

As part of the Vault 7 series, WikiLeaks released a set of documents that is essentially a user manual for a set of hacking tools belonging to the CIA. The hacking tools are capable of infecting air-gapped PCs via USB drives and are collectively named as the Brutal Kangaroo. Brutal Kangaroo Brutal Kangaroo is not […]

This is a post from HackRead.com Read the original post: WikiLeaks’ Latest Dump Exposes CIA Hacking Tools for air-gapped PCs

Continue reading WikiLeaks’ Latest Dump Exposes CIA Hacking Tools for air-gapped PCs