May 19, 2017
0 0

‘Athena’ – CIA windows hacking

Written by


Today, May 19 2017, WikiLeaks distributes reports from the “Athena” venture of the CIA. “Athena” – like the related “Hera” framework – gives remote guide and loader capacities on target PCs running the Microsoft Windows working framework (from Windows XP to Windows 10). Once introduced, the malware gives a beaconing capacity (counting arrangement and errand dealing with), the memory stacking/emptying of malignant payloads for particular undertakings and the conveyance and recovery of records to/from a predefined registry on the objective framework. It enables the administrator to design settings amid runtime (while the embed is on focus) to tweak it to an operation.

As per the documentation , the malware was created by the CIA in collaboration with Siege Technologies, a self-announced digital security organization situated in New Hampshire, US. On their site, Siege Technologies expresses that the organization “… concentrates on utilizing hostile cyberwar innovations and systems to create prescient digital security answers for protection, government and other focused on business sectors.”. On November fifteenth, 2016 Nehemiah Security reported the procurement of Siege Technologies.

In an email from HackingTeam (distributed by WikiLeaks here), Jason Syversen, organizer of Siege Technologies with a foundation in cryptography and hacking, “… said he set out to make what might as well be called the military’s supposed likelihood of execute metric, a measurable examination of whether an assault is probably going to succeed. ‘I feel more great taking a shot at electronic fighting,’ he said. ‘It’s somewhat unique in relation to bombs and atomic weapons – that is an ethically complex field to be in. Presently as opposed to besieging things and having inadvertent blow-back, you can truly decrease non military personnel setbacks, which is a win for everyone.'”


Documents :- here

Article Tags:
· ·
Article Categories:

Leave a Comment

Your email address will not be published. Required fields are marked *