Full Control, from XP to Windows 10
In yet another publication of its controversial Vault 7 series, WikiLeaks people leaked technical details about a variant of spyware that bears the code name Athena, developed by the CIA and a private company. The attacker can enter an infected computer remotely, enter and / or execute malicious packages with specific functions, and take files without compromising their persistence in the operating system.
WannaCry was just a sample of what can happen when certain government agencies begin to accumulate exploits and payloads as if they were traditional weapons ... and leave an open door. For years we have called on the major market players for greater transparency in their collaboration with these agencies, and after WannaCry, the pressure is felt more than ever. However, the detail that these corporations decide to speak or not pale in the face of the "cyberarsenal" that the authorities keep "in the name of national security", and other similar expressions. It is a matter of time for a new global campaign to hit common users, therefore, our best defense is to get as much information as possible about those weapons. That's when WikiLeaks takes part with its publications on Vault 7, and the last entry is named Athena.
Although it all depends on the method of infection used, Athena sounds like a real feast for malicious elements thinking about conducting a ransomware campaign. The documentation shared by WikiLeaks is very broad, and includes a "user guide" with more than 40 pages.
Official site: Click here
Comments