Home Government Tech Policy CIA created code to impersonate Kaspersky Lab: WikiLeaks
CIA created code to impersonate Kaspersky Lab: WikiLeaks Featured

The CIA created code that could be used to impersonate exfiltration attempts from computers infected with its malware implants as being staged by others, according to WikiLeaks. Three examples of impersonating Kaspersky Lab were released by the whistle-blower website on Thursday.

In a release dubbed Vault 8, which includes source code for documents released under the name Vault 7, WikiLeaks said that the code released was for Hive, infrastructure that the CIA used to control its malware.

It said digital certificates for authenticating implants that the CIA used were created by the agency in order to deceive those who were being infiltrated.

Three examples included in the source code release built a fake certificate for Kaspersky Lab, a company whose products have been banned from use by US public sector bodies over the claim that it aids spying by Russia.

The fake certificates appeared to be signed by Thawte premium Server CA, Cape Town.

"In this way, if the target organisation looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated," WikiLeaks said.

Reacting to the WikiLeaks publication, Kaspersky Lab founder Eugene Kaspersky tweeted that the company could confirm that certificates issued in its name were fake.

Asked for his take on the Vault 8 release, former NSA hacker Jake Williams said: "I think it's probably hurtful to the CIA, since security professionals now have the source code in addition to the documentation. It certainly helps those developing new offensive cyber programs.

Williams, who now runs his own security firm named Rendition Infosec, added: "As for immediate danger to the general public, I don't think that exists. There don't appear to be any exploits, just the code for a backdoor framework. The framework appears to be for Linux and UNIX only (not Windows)."

iTWire has sought comment from Kaspersky Lab.

Kaspersky Lab has been under intense pressure since the US presidential election over what is claimed to be involvement in helping the Russian government. It has had to wind up its Washington office after the ban on use of its products in the public sector was issued.

Reports in major US newspapers have claimed that Kaspersky software was used to exfiltrate data about NSA malware to Russian government hackers. Last month, the company issued its version of how this could have happened without its involvement.

The WikiLeaks release said Hive was used to mask the communications that any implant made with its command and control server.

"Using Hive, even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the Internet," it said.

"Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA."


Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.


Popular News




Guest Opinion


Sponsored News