WikiLeaks Reveals Archimedes, The CIA’s Tool To Hack Local Area Networks

Archimedes is used to attacking computers inside a Local Area Network (LAN).
By |
Be Sociable, Share!
    • Google+

    In its seventh CIA leak since March 23rd, WikiLeaks has just revealed the user manual of a CIA hacking tool known as ‘Archimedes’ which is purportedly used to attack computers inside a Local Area Network (LAN).  The CIA tool works by redirecting a target’s

    The CIA tool works by redirecting a target’s web page search to a CIA server which serves up a web page that looks exactly like the original page they were expecting to be served, but which contains malware.

    It’s only possible to detect the attack by examining the page source.



    Per WikiLeaks:

    Today, May 5th 2017, WikiLeaks publishes “Archimedes”, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target’s computers web browser to an exploitation server while appearing as a normal browsing session.

    The document illustrates a type of attack within a “protected environment” as the tool is deployed into an existing local network abusing existing machines to bring targeted computers under control and allowing further exploitation and abuse.

    The RT provided more details:

    The Archimedes tool enables traffic from one computer inside the LAN to be redirected through a computer infected with this malware and controlled by the CIA, according to WikiLeaks.

    The technique is used to redirect the target’s computer web browser to an exploitation server while appearing as a normal browsing session, the whistleblowing site said. In this way, the hackers gain an entry point that allows them access to other machines on that network.

    The tool’s user guide, which is dated December 2012, explains that it’s used to re-direct traffic in a Local Area network (LAN) from a “target’s computer through an attacker-controlled computer before it is passed to the gateway.”

    This allows it to insert a false webserver response that redirects the target’s web browser to a server that will exploit their system all the while appearing as if it’s a normal browsing session.

    Archimedes is an update to a tool called ‘Fulcrum’ and it offers several improvements on the previous system, including providing a method of “gracefully shutting down the tool on demand.”

     


    © ZeroHedge.com 

    Be Sociable, Share!

    Stories published in our Hot Topics section are chosen based on the interest of our readers. They are republished from a number of sources, and are not produced by MintPress News. The views expressed in these articles are the author’s own and do not necessarily reflect Mint Press News editorial policy.

     

    Print This Story Print This Story
    You Might Also Like  
    ___________________________________________
    This entry was posted in Daily Digest, National, News and tagged , , , , , , , . Bookmark the permalink.
    • How odd there are no other comments on this story. I wonder why that is? If it’s people don’t understand what is being said here, or they don’t care? Or is there some obvious reason this is no big deal?

      • Reg Compton

        I notice you didn’t comment on the article either. The trouble is Wikileaks has changed nothing. It has not made governments anywhere more accountable, just the opposite in fact. What do you say to that?

        • Hi Reg. I say first and foremost to your question that I’d rather know the truth than not. No matter where it comes from. Truth to power is the only goal.

          Second, I think my curiosity as to why this level of privacy invasion by our own government had yet to receive any thoughtful comments at the time I made mine a day after this article printed? The lack of reaction to the gist of this article’s revelation was my comment. I am honestly stunned that either no one understands implication of what this program does, and/or they don’t care. Or it’s no big deal because why?

          I think it is a big deal. A very big one. And it’s not wikileaks job to make it all OK for us. That’s our “job”. Besides that, how simple it would all be if we could just hone in on one location, person, or even branch of government to place our blame and bring them shame. But it’s a whole planet of different governments and their elites. All working closer together than most of us ever have. What do you say to that?

          And lastly, it seems to me this article is about the CIA and not Julian Assange. So that makes you the one who has not commented on the article. I’d call your focus on the “messenger” rather than the message a little off-topic even.

          But that’s OK.

          And still no one is commenting on the CIA planting virtual bugs on our local networks. Why isn’t that an admission of a way too overboard civil rights intrusion? Doesn’t it raise any questions from the sheeple?

          Doesn’t it compel any critical-thinking?

          • Reg Compton

            Obviously not, but at least I goaded you into actually saying something. You need to visit activist websites to see the outrage over government intrusion. Don’t expect nerds to care, they are part of the problem.

            • Your heart may be in the right place, but in this case you have done absolutely nothing here to excite the conversation we should be having about this article. And if you mean by my “actually saying something” after you have supposedly “goaded” me, as something of “substance”? Please tell me how anything in our pointless exchange has furthered the cause of democracy. Or further enlightened either of us on the dangers of the hidden hand? I think you’ll find that CASS and I have actually had some discussion above of more real “substance”. More real importance.

              I would much rather have us be comrades and discuss solutions as human beings. But if all you’re interested in is “goading” folks, please go pick on the clinton and trump trolls. They and the libertarians are the ones who need “goading” the most. And very much shamed as well…

      • cass

        It’s not being made a big deal (by the MSM) on purpose. I read the article and am shocked, really. I will ask the IT person as work if they are aware of this.

        • Well naturally the MSM will downplay this if they even report it. Actually I am stunned that this article here isn’t getting any response here. I follow this blog closely and while there are not slews of people making comments on the stories I am most attracted to, there should be a conversation going on here. And still there is not. Except for you and me now…

          My first question when I read this was, “Does my malware software offer me any security against this?”. I have a few different things I do to avoid this kind of hacking, and feel pretty safe for the most part. That reflects my wondering if this was just no big deal.

          But the fact that wikileaks seems to think this is something to be very wary of, and the CIA seems to think it’s money well spent (I would assume they don’t chase after dead ends with our tax money). Then I have to wonder what I might be missing here.

          And I had hoped that I would be reading different perspectives from some smart people. I appreciate yours, and the thought of discussing this with your IT person. Ask them how our normal real-time malware and firewall deterrents relate to this threat. That’s actually the heart of what all our concerns should be anyway. Then after that, putting a stop to this totalitarian government once and for all!!

          • cass

            I’ll get back to you !