{"id":101650,"date":"2017-11-13T12:00:44","date_gmt":"2017-11-13T12:00:44","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=101650"},"modified":"2017-11-10T11:57:18","modified_gmt":"2017-11-10T11:57:18","slug":"vault-8-hive","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/11\/vault-8-hive\/","title":{"rendered":"Vault 8: Hive"},"content":{"rendered":"<blockquote><p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-90223\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><em>Vault 8: <\/em><em>Source code and analysis for CIA software projects including those described in the <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/\" >Vault7<\/a> <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/\" >series<\/a>.<\/em><\/p>\n<p><em>This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components.<\/em><\/p>\n<p><em>Source code published in this series contains software designed to run on servers controlled by the CIA. Like WikiLeaks&#8217; earlier Vault7 series, the material published by WikiLeaks does <strong>not<\/strong> contain 0-days or similar security vulnerabilities which could be repurposed by others.<\/em><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/cia-vault-8-wikileaks-logo.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101651\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/cia-vault-8-wikileaks-logo-150x150.png\" alt=\"\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/cia-vault-8-wikileaks-logo-150x150.png 150w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/cia-vault-8-wikileaks-logo-300x300.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/cia-vault-8-wikileaks-logo.png 400w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><em>\u00a0<\/em>Today, 9 November 2017, WikiLeaks publishes the source code and development logs to <em>Hive<\/em>, a major component of the CIA infrastructure to control its malware.<\/p>\n<p><em>Hive<\/em> solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using <em>Hive<\/em> even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. <em>Hive<\/em> provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.<\/p>\n<p><em>Hive<\/em> can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. &#8220;perfectly-boring-looking-domain.com&#8221;) for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a &#8220;hidden&#8221; CIA server called <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/cms\/page_17760679.html\" >&#8216;Blot&#8217;<\/a>.<\/p>\n<p>The cover domain delivers &#8216;innocent&#8217; content if somebody browses it by chance. A visitor will not suspect that it is anything else but a normal website. The only peculiarity is not visible to non-technical users &#8211; a HTTPS server option that is not widely used: <em>Optional Client Authentication<\/em>. But <em>Hive<\/em> uses the uncommon <em>Optional Client Authentication<\/em> so that the user browsing the website is not required to authenticate &#8211; it is optional. But implants talking to <em>Hive<\/em> do authenticate themselves and can therefore be detected by the <em>Blot<\/em> server. Traffic from implants is sent to an implant operator management gateway called <em>Honeycomb<\/em> (see graphic above) while all other traffic go to a cover server that delivers the insuspicious content for all other users.<\/p>\n<p>Digital certificates for the authentication of implants are generated by the CIA impersonating existing entities. The three examples included in the source code build a fake certificate for the anti-virus company <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault8\/document\/repo_hive\/client\/ssl\/CA\/client_crt\/\" >Kaspersky Laboratory, Moscow<\/a> pretending to be signed by <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault8\/document\/repo_hive\/client\/ssl\/CA\/ca_crt\/\" >Thawte Premium Server CA, Cape Town<\/a>. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated.<\/p>\n<p>The documentation for <em>Hive<\/em> is <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/#Hive\" >available<\/a> from the WikiLeaks <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/\" >Vault7 series<\/a>.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/hive-vault-8-wikileaks.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-101652\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/hive-vault-8-wikileaks.png\" alt=\"\" width=\"700\" height=\"485\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/hive-vault-8-wikileaks.png 709w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/11\/hive-vault-8-wikileaks-300x208.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<blockquote>\n<h2><em>Leaked Documents:<\/em><\/h2>\n<p><em><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault8\/document\/repo_hive\/\" >Hive Repository <\/a><\/em><\/p>\n<p><em><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault8\/document\/hive-log\/\" >Hive Commit History <\/a><\/em><\/p><\/blockquote>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault8\/#Hive\" >Go to Original \u2013 wikileaks.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, 9 Nov 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware. Vault 8: Source code and analysis for CIA software projects including those described in the Vault7 series.This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-101650","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/101650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=101650"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/101650\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=101650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=101650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=101650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}