{"id":89808,"date":"2017-04-03T12:00:24","date_gmt":"2017-04-03T11:00:24","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=89808"},"modified":"2017-04-01T17:42:22","modified_gmt":"2017-04-01T16:42:22","slug":"wikileaks-reveals-marble-proof-cia-disguises-their-hacks-as-russian-chinese-arabic","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/04\/wikileaks-reveals-marble-proof-cia-disguises-their-hacks-as-russian-chinese-arabic\/","title":{"rendered":"WikiLeaks Reveals &#8220;Marble&#8221;: Proof CIA Disguises Their Hacks as Russian, Chinese, Arabic&#8230;"},"content":{"rendered":"<p><em>31 Mar 2017 &#8211; <\/em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/03\/vault-7-cia-hacking-tools-revealed\/\" >WikiLeaks\u2019 latest Vault 7 release<\/a> contains a batch of documents, named \u2018Marble\u2019, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages.\u00a0 The tool was in use as recently as 2016.\u00a0 Per the <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/?marble#Marble%20Framework\" >WikiLeaks <\/a>release:<\/p>\n<p style=\"padding-left: 30px;\">&#8220;The source code shows that Marble has test examples not just in English but also in <strong>Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game,<\/strong> for example by pretending that the spoken language of the malware creator was not American English, but Chinese, <strong>but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,<\/strong> &#8212; but there are other possibilities, such as hiding fake error messages.&#8221;<\/p>\n<p>https:\/\/twitter.com\/wikileaks\/status\/847749901010124800\/photo\/1?ref_src=twsrc%5Etfw&#038;ref_url=http%3A%2F%2Fwww.zerohedge.com%2Fnews%2F2017-03-31%2Fwikileaks-reveals-marble-proof-cia-disguises-their-hacks-russian-chinese-arabic<\/p>\n<p>The latest release is <a target=\"_blank\" href=\"https:\/\/www.rt.com\/news\/382940-wikileaks-vault7-marble-framework\/\" >said to potentially allow for &#8216;thousands<\/a>&#8216; of cyber attacks to be attributed to the CIA which were originally blamed on foreign governments.<\/p>\n<p style=\"padding-left: 30px;\"><strong>WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified.<\/strong> WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.<\/p>\n<p style=\"padding-left: 30px;\">It\u2019s \u201cdesigned to allow for flexible and easy-to-use obfuscation&#8221; as &#8220;string obfuscation algorithms\u201d often link malware to a specific developer, according to the whistleblowing site.<\/p>\n<p style=\"padding-left: 30px;\">The source code released reveals Marble contains <strong>test examples in Chinese, Russian, Korean, Arabic and Farsi.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">\u201cThis would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,\u201d WikiLeaks explains, \u201cBut there are other possibilities, such as hiding fake error messages.\u201d<\/p>\n<p style=\"padding-left: 30px;\">The code also contains a \u2018deobfuscator\u2019 which allows the CIA text obfuscation to be reversed. \u201cCombined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.\u201d<\/p>\n<p style=\"padding-left: 30px;\">\u00a0Previous Vault7 releases have referred to the CIA\u2019s ability to mask its hacking fingerprints.<\/p>\n<p style=\"padding-left: 30px;\">\u00a0<strong>WikiLeaks claims the latest release will allow for thousands of viruses and hacking attacks to be attributed to the CIA.<\/strong><\/p>\n<p>https:\/\/twitter.com\/wikileaks\/status\/847773877954543616\/photo\/1?ref_src=twsrc%5Etfw&#038;ref_url=http%3A%2F%2Fwww.zerohedge.com%2Fnews%2F2017-03-31%2Fwikileaks-reveals-marble-proof-cia-disguises-their-hacks-russian-chinese-arabic<\/p>\n<p>And the rabbit hole just got even deeper.<\/p>\n<p>* * *<\/p>\n<p>Full release from WikiLeaks:<\/p>\n<p>Today, March 31st 2017, WikiLeaks releases <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/\" >Vault 7<\/a> &#8220;Marble&#8221; &#8212; <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Marble\/Marble.zip\" >676 source code files<\/a> for the CIA&#8217;s secret anti-forensic <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/cms\/space_15204359.html\" >Marble Framework<\/a>. <strong>Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.<\/strong><\/p>\n<p>Marble does this by hiding (&#8220;obfuscating&#8221;) text fragments used in <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/\" >CIA malware<\/a> from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.<\/p>\n<p>Marble forms part of the CIA&#8217;s <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/cms\/page_11629046.html\" >anti-forensics approach<\/a> and the CIA&#8217;s <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/cms\/page_13763406.html\" >Core Library<\/a> of malware code. It is &#8220;<em>[D]esigned to allow for flexible and easy-to-use obfuscation<\/em>&#8221; as &#8220;<em>string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.<\/em>&#8221;<\/p>\n<p>The Marble source code also includes a <em>deobfuscator<\/em> to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.<\/p>\n<p><strong>The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, &#8212; but there are other possibilities, such as hiding fake error messages.<\/strong><\/p>\n<p>The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.zerohedge.com\/news\/2017-03-31\/wikileaks-reveals-marble-proof-cia-disguises-their-hacks-russian-chinese-arabic\" >Go to Original \u2013 zerohedge.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>31 Mar 2017 &#8211; WikiLeaks\u2019 latest Vault 7 release contains a batch of documents, named \u2018Marble\u2019, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages. The biggest malicious hacker on Earth was, and still is, the CIA.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-89808","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/89808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=89808"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/89808\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=89808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=89808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=89808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}