wiki:2017:hive

Version 6 (modified by aaraujo, 7 years ago) (diff)

--

CIA

https://protonmail.com/blog/cia-wikileaks-encryption/

advanced malwares enable the CIA to record actions such as keystrokes on a mobile device, allowing them to conduct surveillance without breaking encryption. Through this technique, US intelligence agencies can gain access to data before they have been encrypted. What the CIA files dumped by Wikileaks do reveal however, is a significant shift in strategy since the last disclosure of this kind was made by Edward Snowden in 2013. .

the varied leaked files are tied together by a common thread – an almost singular focus on producing malware to attack end-user devices

How is it different from the Snowden leaks: Snowden leaks exposed the NSA and its techniques of blanket surveillance on citizens and governments around the world. Vault7, on the other hand, exposes the CIA and what technologies it uses in cyber warfare against foreign governments as well as against targeted individuals.

Hive is a multi-platform CIA malware suite that can be specifically utilized against states. “The project provides customizable implants for Windows, Solaris, MikroTik? (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.”

Development Tradecraft DOs and DON'Ts

Guía de cosas que se deben hacer y no hacer en el desarrollo de herramientas de vigilancia!!! : how its malware should be hidden when deployed to avoid any fingerprints leading back to the US or the agency

HIVE

https://wikileaks.org/ciav7p1/#HIVE

Hive is a multi-platform CIA malware suite that can be specifically utilized against states. “The project provides customizable implants for Windows, Solaris, MikroTik? (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.”

Why is this critical (https://protonmail.com/blog/cia-wikileaks-encryption/)?

While we are still mapping the dangers of such findings and capabilities, some conclusions are clear.

  • The CIA can frame other governments

By using Hive and zero days, the US can wage a cyber attack against a nation state while purposefully leaving behind a trace that leads to another state. As governments around the world migrate their infrastructure control to cyber space – any cyber attack can have a devastating effect if targeted against hospitals, power plants or telecommunications providers.

Guía de usuario de HIVE

Guía de desarrollador de HIVE

Hive is a software implant designed with “Ring 2” operations in mind. It has two primary functions: beacon and interactive shell. By design, both are limited in features with the purpose of providing an initial foothold for the deployment of other full featured tools.

Hive provides implants for the following target operating systems and processor architectures.


The Hive client has been designed so that triggers can be sent from one Hive client and callbackscaught with another. Or, if preferred, triggers from and callbacks to the same Hive client (default)

Hive client commands:

  • execute an application on the remote computer
  • upload a file to the remote computer
  • download a file to the local computer
  • delete a file on the remote computer
  • close the TCP connection but keep the server running on the remote computer

Cutthroat/Hive? -ILM (Implant Library Model) Cutthroat is the standardized management interface for controlling the Hive implants, versus the executable hclient-linux binary.

Attachments (2)

Download all attachments as: .zip