Breaking News

Here’s How CIA Hacks Computers That Aren’t Connected To The Internet


WikiLeaks has published another set of secret documents which throws lights on CIA’s hacking operations. The latest document consists of 150 pages and they mentioned a CIA malware toolkit which is called Brutal Kangaroo.

Here’s How CIA Hacks Computers That Aren’t Connected To The Internet

Previously, we have seen the Anti-secrecy organization, WikiLeaks published more than thousands of documents which they called “Sophisticated software tools” used by Central Intelligence Agency.
The documents showcased that CIA can turn your TV into a mic, hack into computers, bypass the encryption system in some popular chat apps and much more. Now, WikiLeaks has published a different set of secret documents which throws lights on CIA’s hacking operations.
The latest document consists of 150 pages and they mentioned a CIA malware toolkit which is called Brutal Kangaroo. Brutal Kangaroo is capable of taking control of air-gapped computers by using specialized USB drives.
According to the reports of WikiLeaks, Brutal Kangaroo components creates a custom stealthy network within the targets closed network, which makes the job easier.
The Brutal Kangaroo project consists of four components – Drifting Deadline which is a thumb drive infection tool, Shattered Assurance which is a server tool that handles automated infection of thumb drives, Broken Promise which is a postprocessor that evaluates collected information and Shadow which is a primary persistence mechanism.
Brutal Kangaroo uses a Windows operating system vulnerability which can be exploited by hand-crafted link files to infect USB thumb drives. Once the infected drive is inserted in victims’ computer the component named Drifting deadline deploys the malware.
After the infection, the component Shadow scans other connected computers within the network and infects them. At the end, Broken Promise scans for the data from the air-gapped devices and exfiltrate it.
So, if we put together all the components of Brutal Kangaroo, it becomes a very useful tool to hack the air-gapped devices. You can get more details about Brutal Kangaroo from here
So, what do you think about this? Share your views in the comment box below.

No comments