{"id":70320,"date":"2017-04-01T16:46:35","date_gmt":"2017-04-01T20:46:35","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=70320"},"modified":"2017-04-01T16:47:49","modified_gmt":"2017-04-01T20:47:49","slug":"vault7-wikileaks-reveals-marble-tool-could-mask-cia-hacks-with-russian-chinese-arabic","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=70320","title":{"rendered":"#Vault7: WikiLeaks reveals \u2018Marble\u2019 tool could mask CIA hacks with Russian, Chinese, Arabic"},"content":{"rendered":"<p><!--more--><iframe loading=\"lazy\" src=\"http:\/\/www.rt.com\/news\/382940-wikileaks-vault7-marble-framework\/video\/\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>RT.com<\/p>\n<p>WikiLeaks\u2019 latest batch of documents, named \u2018Marble\u2019, details CIA hacking tactics and how they can hamper forensic investigators from attributing viruses, trojans and hacking attacks to the spy agency . The tool was in use as recently as 2016.<\/p>\n<p>The third release, which contains 676 source code files for the agency\u2019s secret anti-forensics framework, is part of the CIA\u2019s Core Library of malware, according to a <a href=\"http:\/\/wikileaks.org\/vault7\/?marble#Marble%20Framework\">statement<\/a> from WikiLeaks.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">RELEASE: CIA Vault 7 part 3 &quot;Marble&quot; <a href=\"https:\/\/t.co\/M5NBFlXRu4\">https:\/\/t.co\/M5NBFlXRu4<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Vault7?src=hash&amp;ref_src=twsrc%5Etfw\">#Vault7<\/a> <a href=\"https:\/\/t.co\/HFyEf26FHK\">pic.twitter.com\/HFyEf26FHK<\/a><\/p>\n<p>&mdash; WikiLeaks (@wikileaks) <a href=\"https:\/\/twitter.com\/wikileaks\/status\/847749901010124800?ref_src=twsrc%5Etfw\">March 31, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified, meaning the agency allows another party to be blamed for the hack.<\/p>\n<p>A Marble framework document reveals it supports the ability to <em>\u201cadd foreign languages\u201d<\/em> to malware.<em> \u201cNow comes the fun stuff,\u201d<\/em> it reads, listing Chinese, Russian, Korean, Arabic and Farsi in example code, indicating the potential for the CIA to divert attention to international actors.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Within <a href=\"https:\/\/twitter.com\/wikileaks?ref_src=twsrc%5Etfw\">@wikileaks<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Vault7?src=hash&amp;ref_src=twsrc%5Etfw\">#Vault7<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Marble?src=hash&amp;ref_src=twsrc%5Etfw\">#Marble<\/a> release, instructions on adding foreign language to algorithms to hide <a href=\"https:\/\/twitter.com\/hashtag\/CIA?src=hash&amp;ref_src=twsrc%5Etfw\">#CIA<\/a> malware &amp; hacks <a href=\"https:\/\/twitter.com\/hashtag\/dnchack?src=hash&amp;ref_src=twsrc%5Etfw\">#dnchack<\/a> <a href=\"https:\/\/t.co\/gsyh4Y4Gwt\">pic.twitter.com\/gsyh4Y4Gwt<\/a><\/p>\n<p>&mdash; cmaguire (@_ChrisMaguire) <a href=\"https:\/\/twitter.com\/_ChrisMaguire\/status\/847770238716444673?ref_src=twsrc%5Etfw\">March 31, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>It\u2019s<em> \u201cdesigned to allow for flexible and easy-to-use obfuscation&#8221;<\/em> as <em>&#8220;string obfuscation algorithms\u201d<\/em> often link malware to a specific developer, according to the whistleblowing site.<\/p>\n<p><em>\u201cThis would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,\u201d<\/em> WikiLeaks explains,<em> \u201cBut there are other possibilities, such as hiding fake error messages.\u201d<\/em><\/p>\n<div class=\"rtcode\"><center><iframe loading=\"lazy\" src=\"http:\/\/www.facebook.com\/plugins\/video.php?href=http%3A%2F%2Fwww.facebook.com%2FRTvids%2Fvideos%2F1519852468025001%2F&amp;width=500&amp;show_text=false&amp;height=500&amp;appId\" width=\"500\" height=\"500\" frameborder=\"0\" scrolling=\"no\" data-mce-fragment=\"1\"><\/iframe><\/center><\/div>\n<p>The code also contains a \u2018deobfuscator\u2019 which allows the CIA text obfuscation to be reversed. <em>\u201cCombined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.\u201d<\/em><\/p>\n<p><iframe loading=\"lazy\" title=\"\u2018Americans don\u2019t want to believe that CIA is capable of spying\u2019 \u2013 former CIA analyst\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/Y11Jrt9FnAQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<div class=\"rtcode\"><\/div>\n<p>Previous Vault7 releases have referred to the CIA\u2019s ability to mask its hacking fingerprints.<\/p>\n<p>WikiLeaks claims the latest release will allow for thousands of viruses and hacking attacks to be attributed to the CIA.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">RELEASE: CIA Vault 7 Part 3 &quot;Marble&quot; &#8212; thousands of CIA viruses and hacking attacks could now be attributed <a href=\"https:\/\/t.co\/MfNtlwEoZS\">https:\/\/t.co\/MfNtlwEoZS<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Vault7?src=hash&amp;ref_src=twsrc%5Etfw\">#Vault7<\/a> <a href=\"https:\/\/t.co\/2SVNR3v7Ll\">pic.twitter.com\/2SVNR3v7Ll<\/a><\/p>\n<p>&mdash; WikiLeaks (@wikileaks) <a href=\"https:\/\/twitter.com\/wikileaks\/status\/847759470562246656?ref_src=twsrc%5Etfw\">March 31, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The latest release seems authentic because WikiLeaks used <em>\u201cprimary source documents,\u201d<\/em> John Kiriakou, former CIA analyst and whistleblower, told RT.<\/p>\n<p><em>\u201cThese appear to be original CIA documents and I think the information is probably very good,\u201d<\/em> Kiriakou said. <em>\u201cThat points directly to the CIA offensive capabilities. It is something that we all are going to have to think about when we hear about the new virus being spread, or a new hacking operation. We are going to have to wonder now if it is the CIA or if it is an outside organization.\u201d<\/em><\/p>\n<p><em>\u201cI think many Americans have become inured of information from WikiLeaks,\u201d<\/em> he added, lamenting that the information is unlikely to <em>\u201cmake the front pages of the papers,\u201d<\/em> but <em>\u201cwill be buried somewhere in the back.\u201d<\/em><\/p>\n<p><em>\u201cAmericans don\u2019t want to believe the CIA is capable of this kind of thing. Most Americans don\u2019t remember the bad old days of the 1950s and the first half of the 1970s when the CIA was spying on American citizens. It was conducting surveillance, it was conducting experiments on citizens. People have forgotten that. I think Americans are far, far too quick to give the CIA the benefit of the doubt.\u201d<\/em><\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.rt.com\/news\/382940-wikileaks-vault7-marble-framework\/\">http:\/\/www.rt.com\/news\/382940-wikileaks-vault7-marble-framework\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-70320","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/70320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=70320"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/70320\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=70320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=70320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=70320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}