- Jun 9, 2013
- 6,720
Every Friday, WikiLeaks has established a tradition of leaking new documents in the Vault 7 series — which details some of the CIA's hacking tools. Today, the organization leaked documentation about a tool called Athena.
According to leaked documents, which WikiLeaks previously claimed it received from hackers and CIA insiders, Athena is an implant — a CIA technical term for "malware" — that can target and infect any Windows system, from Windows XP to Windows 10, Microsoft's latest OS version.
Documents leaked today are dated between September 2015 and February 2016, showing that the CIA had the ability to hack Windows 10 months after its launch, despite Microsoft boasting about how hard it would be to hack its new OS.
Athena included support for fileless execution
At the technical level, despite using custom terms to describe its modus operandi, Athena isn't that special when compared to other malware developed for cyber-espionage operations.
According to documents, a CIA operative has a builder at his disposal with plenty of options to generate an Athena malware payload. This payload can be specifically assembled to work with an online C&C server, offline, or in a RAM-only mode (also known as diskless/fileless mode).
For installing Athena, operatives had different methods available that ranged from classic delivery methods to supply chain compromise, and even via an in-the-field operative, if necessary.
Once on a target's PC, Athena would communicate with a C&C server from where it would receive instructions or additional payloads it would need to install on its victim's computer. This is a classic architecture we find in most malware today.
Read More. Vault 7: CIA Co-Developed Athena Malware with US Cyber-Security Company
According to leaked documents, which WikiLeaks previously claimed it received from hackers and CIA insiders, Athena is an implant — a CIA technical term for "malware" — that can target and infect any Windows system, from Windows XP to Windows 10, Microsoft's latest OS version.
Documents leaked today are dated between September 2015 and February 2016, showing that the CIA had the ability to hack Windows 10 months after its launch, despite Microsoft boasting about how hard it would be to hack its new OS.
Athena included support for fileless execution
At the technical level, despite using custom terms to describe its modus operandi, Athena isn't that special when compared to other malware developed for cyber-espionage operations.
According to documents, a CIA operative has a builder at his disposal with plenty of options to generate an Athena malware payload. This payload can be specifically assembled to work with an online C&C server, offline, or in a RAM-only mode (also known as diskless/fileless mode).
For installing Athena, operatives had different methods available that ranged from classic delivery methods to supply chain compromise, and even via an in-the-field operative, if necessary.
Once on a target's PC, Athena would communicate with a C&C server from where it would receive instructions or additional payloads it would need to install on its victim's computer. This is a classic architecture we find in most malware today.
Read More. Vault 7: CIA Co-Developed Athena Malware with US Cyber-Security Company