{"id":182423,"date":"2017-03-09T03:00:03","date_gmt":"2017-03-09T08:00:03","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/leaked-docs-suggest-nsa-and-cia-behind-equation-pcworld-pcworld\/"},"modified":"2017-03-09T03:00:03","modified_gmt":"2017-03-09T08:00:03","slug":"leaked-docs-suggest-nsa-and-cia-behind-equation-pcworld-pcworld","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-docs-suggest-nsa-and-cia-behind-equation-pcworld-pcworld\/","title":{"rendered":"Leaked docs suggest NSA and CIA behind Equation &#8230; &#8211; PCWorld &#8211; PCWorld"},"content":{"rendered":"<p><p>Thank you                <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      Purported CIA documents leaked Tuesday appear to confirm that      the U.S. National Security Agency and one of CIA's own      divisions were responsible for the malware tools and      operations attributed to a group that security researchers      have dubbed the Equation.    <\/p>\n<p>      The Equation's cyberespionage activities       were documented in February 2015 by researchers from      antivirus vendor Kaspersky Lab. It is widely considered to be      the most advanced cyberespionage group in the world based on      the sophistication of its tools and the length of its      operations, some possibly dating as far back as 1996.    <\/p>\n<p>      From the start, the tools and techniques used by the Equation      bore a striking similarity to those described in secret      documents leaked in 2013 by former NSA contractor Edward      Snowden. This relationship       was further strengthened by the similarity between      various code names found in the Equation malware and those in      the NSA files.    <\/p>\n<p>      The       new CIA documents leakedby WikiLeaks include a 2015      discussion between members of the agency's Technical Advisory      Council following Kaspersky's analysis of the Equation group.    <\/p>\n<p>      The      discussion focused mostly on what the Equation did wrong      that allowed Kaspersky's researchers to establish      relationships between various tools and link them to the      group. The goal was for the CIA's own cyber teams to learn      from those mistakes and avoid them in their own tools and      operations.    <\/p>\n<p>      The Equation's errors identified during the discussion      included the use of custom cryptographic implementations      instead of relying on standard libraries like OpenSSL or      Microsoft's CryptoAPI, leaving identifying strings in the      program database (PDB), the use of unique mutexes, and the      reuse of exploits.    <\/p>\n<p>      \"The 'custom' crypto is more of NSA falling to its own      internal policies\/standards which came about in response to      prior problems,\" one team member said during the discussion.      \"In the past, there were crypto issues where people used 0      [initialization vectors] and other miss-configurations. As a      result, the NSA crypto guys blessed one library as the      correct implementation and everyone was told to use that.\"    <\/p>\n<p>      \"The Equation Group as labeled in the report does not relate      to a specific group but rather a collection of tools (mostly      TAO some IOC),\" another member wrote.    <\/p>\n<p>      TAO is a reference to the NSA's Office of Tailored Access      Operations, a large division that specializes in the creation      of hacking tools for infiltrating foreign computer systems.      Meanwhile, IOC refers to the Information Operations Center, a      CIA division that, according to       a leaked 2013 budget justification for intelligence      agencies, has shifted focus from counterterrorism to      cyberespionage in recent years.    <\/p>\n<p>      The CIA analysis of Kaspersky's Equation report highlights      how hackers can learn to better hide their attacks based on      research published by security companies. This raises the      question of whether security vendors and independent      researchers should be so forthcoming with the methods they      use to establish links between malware tools.    <\/p>\n<p>      It is a proven fact that attackers learn from public      analyses, and this is something that all researchers consider      when publishing material,\" researchers from Kaspersky Lab      said in an emailed statement. \"It is a calculated risk. Of      course, not all companies choose to disclose all their      findings. Some companies prefer to keep some of the details      for private reports, or not to create a report at all.\"    <\/p>\n<p>      \"We believe that, going forward, a balance will be achieved      between the amount of publicly disclosed information (just      enough to highlight the risks and raise awareness) and the      amount of information kept private (to allow for the      discovery of future attacks),\" the Kaspersky researchers      said.    <\/p>\n<p>      According to them, this new information ties into the      escalating cyber arms race that has been going on since 2012      and shows no signs of slowing down.    <\/p>\n<p>        Lucian Constantin is an IDG News Service correspondent. He        writes about information security, privacy, and data        protection.      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/3178513\/security\/leaked-docs-suggest-nsa-and-cia-behind-equation-cyberespionage-group.html\" title=\"Leaked docs suggest NSA and CIA behind Equation ... - PCWorld - PCWorld\">Leaked docs suggest NSA and CIA behind Equation ... - PCWorld - PCWorld<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Thank you Your message has been sent. There was an error emailing this page. Purported CIA documents leaked Tuesday appear to confirm that the U.S <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-docs-suggest-nsa-and-cia-behind-equation-pcworld-pcworld\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-182423","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/182423"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=182423"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/182423\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=182423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=182423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=182423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}