WikiLeaks reveals CIA Athena application

Athena: WikiLeaks has released a new batch of Vault 7 leaks, which describe an eavesdropping spyware. The new CIA tool “provides remote login and malware loading capabilities on target computers,” and is supposed to be used by the intelligence service for every version of Microsoft's operating systems, from Windows XP to Windows 10.

The spyware is designed to be able to gain complete control over the infected Windows computers, allowing the CIA to perform many functions on the target machine, such as or installing malware, stealing data and sending it to CIA servers.Athena

The leakage includes an Athena user manual, a technology overview, and a demonstration of how to use spyware. It reveals that malicious application can have two uses:

Lady: Athena from XP to Windows 10
Secondary: Hera for Windows 8 via Windows 10

According to WikiLeaks, Athena allows CIA agents to modify their configuration in real time, while the implant can be "adapted to a function."

“Once installed, the malware provides the ability to take pictures, configure and of tasks, loading and unloading malicious payloads into memory for specific tasks, delivering and retrieving files from and specific folders on the target system”.

Leaked documents indicate that Athena, written in Python programming language, was developed in August of 2015, one month after Microsoft's Windows 10 operating system was released.

Interestingly, one document warns CIA agents to make sure that spyware is not exposed by software programs s from viruses, such as Kaspersky AV.

Athena was developed by the CIA in collaboration with Siege Technologies - an American cyber security company that offers aggressive technologies and works closely with the United States government.

However, WikiLeaks did not provide any details on the activities that Athena has been used for, although it is not difficult to imagine how it would use this the CIA.

Since March, WikiLeaks has released nine leaked articles in the "Vault 7" series:

"Year Zero"The CIA is using popular hardware and software.
"Weeping Angel"The spying tool that the service uses to penetrate smart TVs, turning them into disguised microphones.
"Dark Matter"Exploits targeting iPhones and Mac.
"Marble"The source code of a secret anti-forensic framework. It's essentially a obfuscator that the CIA uses to hide the real source of malware.
"Grasshopper"A framework that allows the information service to easily create custom malicious software to violate Microsoft Windows and bypass any virus protection.

"Archimedes"- a MitM attack tool allegedly created by the CIA for targeting computers within a local area network (LAN).

Athena Technology Overview

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).