13:50 GMT +318 July 2018
Listen Live
    Cybersecurity

    CIA Unmasked as 'Very Dangerous' Longhorn Group Hacking Governments Worldwide

    CC0 / Pixabay
    World
    Get short URL
    3366

    The Longhorn hackers, which use the same tools as those revealed to be used by the CIA, are a "very dangerous group" of cyber-attackers, Pierluigi Paganini of the Italian Ministry of Foreign Affairs' Cyber G7 Workgroup told Radio Sputnik.

    On Friday, security firm Symantec reported that the spying tools released in WikiLeaks' Vault 7 leak last month have been used against at least 40 targets in at least 16 different countries since at least 2011. 

    According to WikiLeaks, the Vault 7 collection was leaked from within the CIA's Computer Operations Group. 

    Symantec says that a hacking group it dubbed "Longhorn" has been using those same tools to hack at least 40 targets in 16 different countries, going back to at least 2011.

    "Longhorn has infiltrated governments and internationally operating organizations, in addition to targets in the financial, telecoms, energy, aerospace, information technology, education, and natural resources sectors. All of the organizations targeted would be of interest to a nation-state attacker," Symantec stated.

    "Given the close similarities between the tools and techniques, there can be little doubt that Longhorn's activities and the Vault 7 documents are the work of the same group."

    Pierluigi Paganini of the Italian Ministry of Foreign Affairs' Cyber G7 Workgroup told Radio Sputnik that the revelation about the US government's hacking program does not come as a surprise, since governments across the world are working hard on their cyber capabilities.

    "The group is very, very dangerous. We know it is composed of people that are located in North America, their working time is from Monday to Friday, their targets are quite aligned with the targets that are usually targeted by APT (advanced persistent threat) groups."

    "These elements suggest to the experts that it is an initial state group, so behind these people there are professionals who work with the government in order to extract information and conduct cyber-espionage activities."

    "The report by Symantec collects evidence linking the activity of the group with the activity of US intelligence, the Central Intelligence Agency."

    Paganini said that the report demonstrates the extent to which state actors across the world are developing and engaging in hacking.

    "We cannot exclude the possibility that any government is working to develop sophisticated code, malware, (zero-day) exploits and hacking tools in order to gather intelligence. This is a sign of the times; today, intelligence is mostly made in cyberspace."

    WikiLeaks began its Vault 7 leak last month, when it released 8,000 documents from the CIA's Computer Operations Group which revealed the agency's hacking arsenal, including trojans, viruses and other weaponized malware such as remote control systems. 

    The documents listed the vulnerabilities of popular tech products and devices such as Android, Windows, iPhone and Samsung smart TVs.

    On Friday, WikiLeaks released the latest batch of its Vault 7 series of documents. The 27 documents focused on the agency's Grasshopper platform, used to build malware for Microsoft Windows operating systems.

    Have you heard the news? Sign up to our Telegram channel and we'll keep you up to speed! 

    Related:

    'Un-sensor-ed': The Way Smartphone Users Move Can Be Used to Hack Device PINs
    Twitter Users Slam MSM Hack Over Claim Putin & Trump Colluded in Syria Strikes
    About That 'Hack' of Georgia's US House Special Election
    Hackers Blackmailing White House Staff Reportedly Arrested in Dubai
    Tags:
    hacking allegations, hacking, hackers, United States
    Community standardsDiscussion
    Comment via FacebookComment via Sputnik
    • Сomment