Symantec unveils the CIA Longhorn hacking team

Symantec he said that he has been able to link at least 40 16-targeted attacks to the 7 countries with tools that first announced WikiLeaks through Vault XNUMX that reveals the CIA's spying tactics.

In a lengthy report, Symantec talks about a highly organized group called Longhorn, which the security firm says carried out these attacks. The company emphasizes that Longhorn is made up of CIA agents, and presents ample evidence .Symantec CIA Longhorn

«Τα εργαλεία που χρησιμοποιούνται από την Longhorn ακολουθούν ακριβώς το χρονοδιάγραμμα ανάπτυξης και τις τεχνικές προδιαγραφές που ορίζονται στα έγγραφα που δημοσίευσε το Wikileaks. Η ομάδα Longhorn μοιράζεται τα ίδια πρωτόκολλα κρυπτογράφησης που καθορίζονται στα έγγραφα του Vault 7, εκτός του ότι ακολουθούν τις ίδιες κατευθυντήριες γραμμές τακτικής για να αποφύγουν τον εντοπισμό. Λαμβάνοντας υπόψη τις ομοιότητες μεταξύ των εργαλείων και τεχνικών, δεν μπορεί να υπάρχει αμφιβολία ότι οι δραστηριότητες της Longhorn και τα έγγραφα που διέρρευσαν μέσω του Vault 7 είναι έργο της ίδιας ομάδας," αναφέρει η εταιρεία ασφαλείας.

Who's on Longhorn?

Longhorn is a group that has been active since at least 2011, using a number of backdoors και ευπάθειες zero-day για να αποκτήσει πρόσβαση στους στόχους της. Η ομάδα έχει καταφέρει να διεισδύσει σε κυβερνητικές οργανώσεις και εταιρείες με διεθνή δραστηριότητα. Οι στόχοι της είναι εταιρείες και κυβερνητικοί οργανισμοί που ασχολούνται με οικονομικά, τηλεπικοινωνίες, ενέργεια, αεροδιαστημική, τεχνολογία των πληροφοριών, εκπαίδευση, τομείς φυσικών πόρων, αναφέρει η Symantec αλλά δεν τις κατονομάζει επακριβώς.

These targets were in 16 countries across the Middle East, Europe, Asia and Africa. Once, a computer was infected in the United States, but the malware was uninstalled within a few hours, indicating that the infection was probably inadvertently.

As soon as WikiLeaks began publishing the CIA files, Symantec found that some of these documents contained information closely related to the development of a Longhorn tool called Corentry trojan. Symantec has announced that the tool has new features it discovered when it was able to collect more samples.

Symantec says it has been detecting Longhorn since 2014 when it caught their attention using a zero-day exploit they had embedded in a Word document. Other malware that has been used by Longhorn are Corentry, .Trojan.LH1, and Backdoor.Trojan.LH2.

Before the WikiLeaks revelations, Symantec believed that the Longhorn group was a very well-funded group involved in intelligence gathering operations. Timestamps for the group's work show that the hackers work from Monday to Friday, which made it pretty clear that the group was of some government s.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).