• Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
  • Resources
  • Industry Voice
  • SMB Spotlight
  • Newsletters
  • Resources
    • Inqlogo 120x194
      Inject life into your cloud-hosted applications: 5 best practices to boost end-user experience

      Feel as though the performance of your cloud-hosted applications has become lacklustre? Here are five best practices that can help you boost end-user experiences, simplify performance management, and reduce the cost of your AWS environment. 

      Download
      Inqlogo 120x194
      Your questions answered: How to protect your data in the cloud

      The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • Google+
    • YouTube
  • Newsletter
  • Industry Voice
  • SMB Spotlight
The Inquirer
The Inquirer
  • Home
  • News
  • Artificial Intelligence
  • Internet of Things
  • Open Source
  • Hardware
  • Software
  • Security
The Inquirer
  • Security

Wikileaks dump outs CIA's 'Brutal Kangaroo' toolkit for hacking air-gapped networks

Malware suite likened to Stuxnet worm

CIA uses 'Brutal Kangaroo' toolkit to hack 'air-gapped' networks
CIA uses 'Brutal Kangaroo' toolkit to hack 'air-gapped' networks
  • Graeme Burton
  • @graemeburton
  • 22 June 2017
  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
0 Comments

WHISTLEBLOWING DOCUMENT FOUNDATION Wikileaks has revealed yet more information about the CIA's trove of malware tools, this time on how it takes on 'air gapped' networks. 

"Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumb drives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables," according to Wikileaks' analysis of the CIA manuals.

The malware suite enables CIA operatives to put together attacks using ‘Drifting Deadline', a GUI-based builder, while ‘Shattered Assurance' provides the server component, which runs on infected hosts. ‘Shadow' is a tool that enables operatives to define the tasks they want to undertake on the offline computers, while ‘Broken Promise' is intended to exfiltrate the data.

Brutal Kangeroo, meanwhile, is also the name given to the malware that sits on the targeted closed-network or computer.

"When a user is using the primary host and inserts a USB stick into it, the thumb drive itself is infected with a separate malware. If this thumb drive is used to copy data between the closed network and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on the closed network.

Related: WikiLeaks exposes CIA's 'Archimedes' tool for hacking local area networks

"By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange," claims Wikileaks, adding that the method of compromising closed networks is similar to how the Stuxnet worm worked.

Stuxnet, of course, was the industrial malware that targeted the computers of scientists working in the Iranian nuclear programme, which was accidentally spread much further than intended.

Naturally, the malware exploits vulnerabilities in the Windows operating system in order to be able to auto-execute when the USB stick is plugged into the targeted computers. USB sticks used to auto-execute anything under Windows 95/98 and Windows XP, but this glaring security hole has long been closed.

The Brutal Kangeroo malware suite, though, uses "hand-crafted link files that load and execute programs (DLLs) without user interaction". After one of the flaws was patched in March 2015, the exploit was simply adapted to get round it.

A number of anti-virus and security software vendors claim to be able to detect at least some of the CIA tools. These include packages from Avira, BitDefender and Symantec. µ

  • Tweet  
  • Facebook  
  • Google plus  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Security
  • Windows
  • malware
  • wikileaks
  • cia

INQ Latest

The SNES Classic is official and it's coming in September
The SNES Classic is official and it's coming in September

You might want to start queuing now

  • Numb Thumbs
  • 26 June 2017
AES-256 encryption keys cracked by hands-off hack
AES-256 encryption keys cracked by hands-off hack

'Tempest' attack relies on less than $200 worth of tech

  • Security
  • 26 June 2017
Vodafone and Ericsson join forces to get a 5G head start
Vodafone and Ericsson join forces to get a 5G head start

Network prepares for arrival of next-gen connectivity in London

  • Cellular
  • 26 June 2017
Google Home is six times smarter than Amazon's Echo
Google Home is six times smarter than Amazon's Echo

Probably because it's not powered by Bing

  • Hardware
  • 26 June 2017
Back to Top
26/06/2017 10:53:59

Most read

Apple remains undecided on the fingerprint tech for the iPhone 8
iPhone 8 release date, specs and price: Leaked images show off edge-to-edge display, dual cameras
Galaxy Note 8 specs, release date and price: Samsung reportedly plans August unveiling in New York
Galaxy Note 8 specs, release date and price: Smartphone to launch in September for £875
Intel's Skylake and Kaby Lake CPUs have 'critical' hyper-threading flaw
Intel's Skylake and Kaby Lake CPUs have 'critical' hyper-threading flaw
Microsoft Surface Laptop review
Samsung Galaxy S9 won't come in a Qualcomm Snapdragon variant, according to rumours
Galaxy S9 price, specs and release date: Smartphone might not offer Snapdragon variant
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • Google+
  • YouTube

© Incisive Media Investments Limited 2015

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016