{"id":92671,"date":"2017-05-22T12:01:38","date_gmt":"2017-05-22T11:01:38","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=92671"},"modified":"2017-05-20T14:32:44","modified_gmt":"2017-05-20T13:32:44","slug":"vault-7-athena","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-athena\/","title":{"rendered":"Vault 7: Athena"},"content":{"rendered":"<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-90223\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Today, May 19th 2017, WikiLeaks publishes documents from the &#8220;Athena&#8221; project of the CIA. &#8220;Athena&#8221; &#8211; like the related &#8220;Hera&#8221; system &#8211; provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration and task handling), the memory loading\/unloading of malicious payloads for specific tasks and the delivery and retrieval of files to\/from a specified directory on the target system. It allows the operator to configure settings during runtime (while the implant is on target) to customize it to an operation.<\/p>\n<p>According to the documentation (see <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/AthenaTechnologyOverview\/\" >Athena Technology Overview<\/a>), the malware was developed by the CIA in cooperation with <a target=\"_blank\" href=\"http:\/\/www.siegetechnologies.com\/\" >Siege Technologies<\/a>, a self-proclaimed cyber security company based in New Hampshire, US. On their website, Siege Technologies states that the company &#8220;<em>&#8230; focuses on leveraging <strong>offensive cyberwar technologies<\/strong> and methodologies to develop predictive cyber security solutions for insurance, government and other targeted markets.<\/em>\u201d On November 15th, 2016 <a target=\"_blank\" href=\"https:\/\/nehemiahsecurity.com\/nehemiah-security-acquires-siege-technologies\/\" >Nehemiah Security<\/a> announced the acquisition of Siege Technologies.<\/p>\n<p>In an email from HackingTeam (published by WikiLeaks <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/hackingteam\/emails\/emailid\/169933\" >here<\/a>), Jason Syversen, founder of Siege Technologies with a background in cryptography and hacking, &#8220;<em>&#8230; said he set out to create the equivalent of the military\u2019s so-called probability of kill metric, a statistical analysis of whether an attack is likely to succeed. &#8216;I feel more comfortable working on electronic warfare,&#8217; he said. &#8216;It\u2019s a little different than bombs and nuclear weapons &#8212; that\u2019s a morally complex field to be in. Now instead of bombing things and having collateral damage, you can really reduce civilian casualties, which is a win for everybody.&#8217;<\/em>&#8220;<a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-90672 size-medium\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png\" alt=\"\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png 399w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2 style=\"padding-left: 30px;\">Leaked Documents<\/h2>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Athena-v1_0-UserGuide\/\" >Athena v1.0 User Guide <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/AthenaTechnologyOverview\/\" >Athena Technology Overview <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/AthenaDesign\/\" >Athena (Design) <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/ATHENA-DEMO\/\" >Athena (Demo) <\/a><\/p>\n<p style=\"padding-left: 30px;\"><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/Design_Engine\/\" >Athena (Design\/Engine) <\/a><\/p>\n<p>__________________________________________<\/p>\n<p><em><strong>All Releases:<\/strong><\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/aftermidnight-assassin-frameworks\/\" >Vault 7: AfterMidnight &amp; Assassin Frameworks<\/a> \u2013 12 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-archimedes\/\" >Vault 7: Archimedes \u2013<\/a> 5 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-scribbles-project\/\" >Vault 7: Scribbles Project<\/a> \u2013 28 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-weeping-angel\/\" >Vault 7: Weeping Angel<\/a> \u2013 21 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-hive-project\/\" >Vault 7: Hive Project<\/a> \u2013 14 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/grasshopper\/\" >Vault 7: Grasshopper Framework<\/a> \u2013 7 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/marble-framework\/\" >Vault 7: Marble Framework<\/a> \u2013 31 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/dark-matter\/\" >Vault 7: Project Dark Matter<\/a> \u2013 23 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/03\/vault-7-cia-hacking-tools-revealed\/\" >Vault 7: CIA Hacking Tools Revealed<\/a> \u2013 7 Mar 2017<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/#Athena\" >Go to Original \u2013 wikileaks.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, May 19th 2017, WikiLeaks publishes documents from the &#8220;Athena&#8221; project of the CIA. &#8220;Athena&#8221; &#8211; like the related &#8220;Hera&#8221; system &#8211; provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10).<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-92671","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/92671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=92671"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/92671\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=92671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=92671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=92671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}