{"id":8444,"date":"2017-06-26T16:58:14","date_gmt":"2017-06-26T20:58:14","guid":{"rendered":"http:\/\/www.wasobamaborninkenya.com\/blog\/?p=8444"},"modified":"2017-06-26T16:58:14","modified_gmt":"2017-06-26T20:58:14","slug":"wikileaks-the-cia-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet","status":"publish","type":"post","link":"https:\/\/www.wasobamaborninkenya.com\/blog\/wikileaks-the-cia-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet\/","title":{"rendered":"Wikileaks: The CIA can remotely hack into computers that aren\u2019t even connected to the internet"},"content":{"rendered":"<p><a href=\"http:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2017\/06\/FireShot-Screen-Capture-084-WikiLeaks_-The-CIA-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet-\u2014-Quartz-qz_com_1013361_wikileaks-the-cia-can-remotely-hack-.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8445\" src=\"http:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2017\/06\/FireShot-Screen-Capture-084-WikiLeaks_-The-CIA-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet-\u2014-Quartz-qz_com_1013361_wikileaks-the-cia-can-remotely-hack-.png\" alt=\"\" width=\"937\" height=\"655\" srcset=\"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2017\/06\/FireShot-Screen-Capture-084-WikiLeaks_-The-CIA-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet-\u2014-Quartz-qz_com_1013361_wikileaks-the-cia-can-remotely-hack-.png 937w, https:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2017\/06\/FireShot-Screen-Capture-084-WikiLeaks_-The-CIA-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet-\u2014-Quartz-qz_com_1013361_wikileaks-the-cia-can-remotely-hack--300x210.png 300w, https:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2017\/06\/FireShot-Screen-Capture-084-WikiLeaks_-The-CIA-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet-\u2014-Quartz-qz_com_1013361_wikileaks-the-cia-can-remotely-hack--768x537.png 768w\" sizes=\"auto, (max-width: 937px) 100vw, 937px\" \/><\/a><\/p>\n<h1><strong>Wikileaks: The CIA can remotely hack into computers that aren\u2019t even connected to the internet<\/strong><\/h1>\n<p><strong>Quartz<\/strong><br \/>\nby Keith Collins<br \/>\n6\/24\/2017<\/p>\n<p><strong>Excerpt:<\/strong><\/p>\n<p><em>When firewalls, network-monitoring services, and antivirus software aren\u2019t enough, there\u2019s always been one surefire way to protect computers that control sensitive operations like power grids and water pumps: cut them off from the internet entirely. But new documents <a href=\"https:\/\/wikileaks.org\/vault7\/\">published<\/a> by WikiLeaks on June 22 suggest that even when such extreme measures are taken, no computer is safe from motivated, well-resourced hackers.<\/em><\/p>\n<p><em>The 11 documents describe a piece of software called \u201cBrutal Kangaroo,\u201d a set of tools built for infiltrating isolated, \u201cair-gapped\u201d computers by targeting internet-connected networks within the same organization. It\u2019s the latest publication in the \u201cVault 7\u201d series of leaked documents, which describe myriad hacking tools WikiLeaks says belong to the US Central Intelligence Agency (CIA).<\/em><\/p>\n<p><em>Brutal Kangaroo works by creating a digital path from an attacker to an air-gapped computer and back. The process begins when a hacker remotely infects an internet-connected computer in the organization or facility being targeted. Once it has infected that first computer, what the documents refer to as the \u201cprimary host,\u201d Brutal Kangaroo waits. It can\u2019t spread to other systems until someone plugs a USB thumb drive into that first one.<\/em><\/p>\n<p><em>Once someone does, malware specific to the make and model of the thumb drive is copied onto it, hiding in modified LNK files that Microsoft Windows uses to render desktop icons, and in DLL files that contain executable programs. From this point, Brutal Kangaroo will spread further malware to any system that thumb drive is plugged into. And those systems will infect every drive that\u2019s plugged into them, and so on, and the idea is that eventually one of those drives will be plugged into the air-gapped computer.<\/em><\/p>\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n<p><strong>View the complete article including images and links at:<\/strong><\/p>\n<p><a href=\"https:\/\/qz.com\/1013361\/wikileaks-the-cia-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet\/\">https:\/\/qz.com\/1013361\/wikileaks-the-cia-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wikileaks: The CIA can remotely hack into computers that aren\u2019t even connected to the internet Quartz by Keith Collins 6\/24\/2017 Excerpt: When firewalls, network-monitoring services, and antivirus software aren\u2019t enough, there\u2019s always been one surefire way to protect computers that &hellip; <a href=\"https:\/\/www.wasobamaborninkenya.com\/blog\/wikileaks-the-cia-can-remotely-hack-into-computers-that-arent-even-connected-to-the-internet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"class_list":["post-8444","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts\/8444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/comments?post=8444"}],"version-history":[{"count":1,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts\/8444\/revisions"}],"predecessor-version":[{"id":8446,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts\/8444\/revisions\/8446"}],"wp:attachment":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/media?parent=8444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/categories?post=8444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/tags?post=8444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}