WikiLeaks reveals CIA Athena application

Athena: WikiLeaks has released a new batch of Vault 7 leaks, which describe an eavesdropping spyware. The new CIA tool "provides capabilities to remotely connect to and load malware onto target computers," and is supposed to ται από την υπηρεσία πληροφοριών για κάθε έκδοση των λειτουργικών συστημάτων της Microsoft, από τα Windows XP μέχρι τα .

Spyware is designed to be able to fully acquire full control over infected Windows computers, allowing the CIA to perform many functions on the target machine, such as data deletion or malware installation, data theft, and CIA servers.Athena

Η περιλαμβάνει ένα εγχειρίδιο χρήσης του Athena, μια επισκόπηση της τεχνολογίας και μια επίδειξη για τον τρόπο χρήσης του spyware. Αποκαλύπτει δε ότι η κακόβουλη εφαρμογή μπορεί έχει δύο χρήσεις:

Lady: Athena from XP to Windows 10
Secondary: Hera for Windows 8 via Windows 10

According to WikiLeaks, Athena allows CIA agents to modify their configuration in real time, while the implant can be "adapted to a function."

"Once installed, the provides the ability to photograph, configure and manage tasks, load and unload in the memory of harmful payloads for specific tasks, delivery and retrieval of files from and specific folders in the destination system ”.

Leaked documents indicate that Athena, written in Python programming language, was developed in August of 2015, one month after Microsoft's Windows 10 operating system was released.

Interestingly, one document warns CIA agents to make sure the spyware isn't revealed in advanceτα λογισμικού προστασίας από ιούς, όπως το Kaspersky .

Athena was developed by the CIA in collaboration with Siege Technologies – an American cyber security company that offers offensive and works closely with the United States government.

However, WikiLeaks did not give any detail on Athena's activities, although it is not difficult to imagine how the CIA would use this program.

Since March, WikiLeaks has released nine leaked articles in the "Vault 7" series:

"Year Zero"The CIA is using popular hardware and software.
"Weeping Angel”The espionage tool used by the service to infiltrate televisions, turning them into covert microphones.
"Dark Matter"Exploits targeting iPhones and Mac.
"Marble”The source code of a secret anti-forensic . It is essentially an obfuscator used by the CIA to hide the real source of malware.
"Grasshopper"A framework that allows the information service to easily create custom malicious software to violate Microsoft Windows and bypass any virus protection.

"Archimedes"- a MitM attack tool allegedly created by the CIA for targeting computers within a local area network (LAN).

Athena Technology Overview The Best Technology Site in Greecefgns

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).