top | item 13830361

Wikileaks is offering tech firms CIA files first

93 points| marksomnian | 9 years ago |bbc.co.uk | reply

111 comments

order
[+] ttctciyf|9 years ago|reply
From the BBC:

> He claimed that an anti-virus expert, who was not named, had come forward to say that he believed sophisticated malware that he had previously attributed to Iran, Russia and China, now looked like something that the CIA had developed.

That sounds very like something I read on Robert Graham's Mar 7 comments[1] on the leak:

> Already, one AV researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak.

1: http://blog.erratasec.com/2017/03/some-comments-on-wikileaks...

[+] mikeyouse|9 years ago|reply
The post you link directly contradicts this:

> There's no false flags. In several places, the CIA talks about making sure that what they do isn't so unique, so it can't be attributed to them. However, Wikileaks's press release hints that the "UMBRAGE" program is deliberately stealing techniques from Russia to use as a false-flag operation. This is nonsense. For example, the DNC hack attribution was live command-and-control servers simultaneously used against different Russian targets -- not a few snippets of code.

[+] problems|9 years ago|reply
It wouldn't surprise me - a lot of the stuff they use to identify a malware source just isn't that accurate. Anyone can buy a server from the other side of the world, anyone can put strings in another language into malware and anyone can target a source country starting from a specific provider or VPN.
[+] Aqueous|9 years ago|reply
Once you admit that keeping secret and controlling the release of sensitive information has some 'harm minimization effect' - and therefore that releasing information in the wrong way or to the wrong people is potentially harmful - exactly where does that take the philosophy of 'radical transparency?'
[+] problems|9 years ago|reply
They're advocating for radical transparency of governments and corporations, not individuals - there's a significant difference. Releasing these exploits as is would result in harm to individuals who are unrelated entirely to the CIA or government.
[+] knieveltech|9 years ago|reply
Harmful to whom may be the important question here. I thought the underlying premise of radical transparency was to make it sufficiently difficult to maintain state and corporate secrets that they either give up trying to keep secrets entirely or at least learn to avoid conducting truly shady activities because secrecy is no longer a guaranteed. If that's true then I'd say that admission is a strong endorsement that the practice is at least on sound theoretical ground.
[+] 0xfeba|9 years ago|reply
> He added that while Wikileaks maintained a neutral position on most of its leaks, in this case it did take a strong stance.

Uh huh. After the US Election debacle, I'm not so sure of that.

[+] M_Grey|9 years ago|reply
It tells you that the person advocating that philosophy has given themselves license to wield all of that enormous power you're describing, without check or balance.
[+] iaw|9 years ago|reply
Wikileaks stopped being about 'radical transparency' when Julian Assange felt personally threatened by Hillary Clinton and Google. Since then the Wikileaks agenda appears to be more about attacking and undermining US policy and standing wherever it can.
[+] tssva|9 years ago|reply
WikiLeaks believe in radical transparency has never applied to WikiLeaks itself.
[+] Iv|9 years ago|reply
Wikileaks has always defended responsible disclosure and censored crucial names. They simply have a different notion of who or what is crucial.
[+] moo|9 years ago|reply

[deleted]

[+] sand500|9 years ago|reply
Pretty standard practice when a exploit is found right? Alert companies and publicize after they patch it.
[+] cracell|9 years ago|reply
In general but I believe this is the first time wikileaks has had specific exploit information so it's the first time they are doing it.
[+] problems|9 years ago|reply
Yeah, it'll be interesting here though - they potentially have some pretty major remote exploits and tech firms might be resistant to even patch as those who are unpatched will be left vulnerable to attack. The standard route then is to threaten to publish anyways... This will involve very careful treading on the parts of both wikileaks and the firms involved.
[+] therealmarv|9 years ago|reply
The standard practice for Wikileaks was once to publish everything no matter what. I'm happy they have changed.
[+] devy|9 years ago|reply
> "a whole section of the CIA is working on Umbrage, a system that attempts to trick people into thinking that they had been hacked by other groups or countries by collecting malware from other nation states, such as Russia."

What do you think of Umbrage?

[+] mikeyouse|9 years ago|reply
Wikileaks is dramatically misrepresenting what Umbrage is. There are descriptive documents that explain exactly what it is and how it's meant to be used that were also leaked. Even the Intercept, who aren't exactly friendly to intelligence sources took umbrage (ha) with WL's characterization:

> It would be possible to leave such fingerprints if the CIA were re-using unique source code written by other actors to intentionally implicate them in CIA hacks, but the published CIA documents don’t say this. Instead they indicate the UMBRAGE group is doing something much less nefarious.

> They say UMBRAGE is borrowing hacking “techniques” developed or used by other actors to use in CIA hacking projects. This is intended to save the CIA time and energy by copying methods already proven successful. If the CIA were actually re-using source code unique to a specific hacking group this could lead forensic investigators to mis-attribute CIA attacks to the original creators of the code. But the documents appear to say the UMBRAGE group is writing snippets of code that mimic the functionality of other hacking tools and placing it in a library for CIA developers to draw on when designing custom CIA tools.

https://theintercept.com/2017/03/08/wikileaks-files-show-the...

[+] problems|9 years ago|reply
I think it's going to be severely abused politically.

I've already seen a few people on the right saying it means the DNC hack was 100% fake.

And I've already seen a security researcher on the left saying it has nothing to do with the results because "they found running C&C servers in that case", like you can't buy C&C servers anywhere in the world that you want.

Neither claim makes any verifiable sense. Hacking attribution is somewhere between hard and impossible if your opponent doesn't want to be found or wants you to find someone else instead.

It's a legitimately interesting program and something to consider when these claims get made. But don't listen the politics of it. It'll be a nightmare.

[+] 086421357909764|9 years ago|reply
That it's a logical program for a Covert / Clandestine intelligence agency.
[+] swalsh|9 years ago|reply
I wonder if firms are going to start using these fixes to search for people who have touched the files in order to find... patriots...
[+] celticninja|9 years ago|reply
The CIA pretending to be China, or China pretending to be the CIA, or someone else entirely pretending to be China pretending to be the CIA, or vice versa.
[+] ikeyany|9 years ago|reply
If I had money/power, I would assume every device and account I have is compromised in some way.

Back to pen and paper we go, until that can be compromised too.

[+] plandis|9 years ago|reply
I must be the only person to think it's weird that intelligence leaks are never from China or Russia.

It's probably just a coincidence.

[+] mickronome|9 years ago|reply
So what are you implying with that ambigous and opaque statement ?

Some possible reasons: * They comparmentalise information better? * They don't use private contractors ? * It's more dangerous to leak material in those countries ? * ... * ... * ...

[+] problems|9 years ago|reply
Likely has a lot to do with the countries themselves. Russia and China have much stricter governments and the values on freedom and privacy aren't as widely respected - so not as many leakers pop up.
[+] Florin_Andrei|9 years ago|reply
It's almost like it's painting a pattern now. Almost.
[+] SomeStupidPoint|9 years ago|reply
Definitely a coincidence that it was within a week of Sessions being taken to task over his involvement with Russia and a Trump adviser being told by the SSCI to retain information about contact with Russia.

We all know there's no chance this is smearing US intel agencies during an investigation.

[+] dguido|9 years ago|reply
Don't believe anything from Assange until it's confirmed by the tech companies themselves. Ask the security teams at each of these companies if they received any information from Wikileaks. From the people I know at the affected companies, no one has heard anything yet. Assange should not get the benefit of our trust.
[+] Ninn|9 years ago|reply
Please make a list of firms which have provided these comments denying that Wikileaks has provided them with information while claiming to have done so. This way others are able to confirm your comment. Otherwise it's really hard to take your comment seriously.
[+] tptacek|9 years ago|reply
I know it's not normally a good idea to comment about voting and comment position, but there are a lot of people talking about this issue on HN and this comment is one of the few written by someone directly engaged with these issues. If Dan says he hasn't heard anything from any security team he's familiar with, that's not dispositive, but given how connected Dan is, it's certainly a real data point.

I say this because it would make sense to vote a comment like this down if it was just a random opinion. I agree: "don't trust Assange" is kind of a banal sentiment (I share it, but I wouldn't claim it was interesting enough to showcase). But that's not all Dan is saying.

(I haven't heard anything either but, I mean, I've only known about this for about 3 minutes now).

[+] saranagati|9 years ago|reply
Very few people at these companies would have any idea about the vulnerabilities and even less would know where the reports came from. Big tech companies realize that they employee a lot of people and heavily restrict who can know about the reported vulnerabilities,me specially before they're patched. To think that those "privileged" people would tell you about it is asinine, especially regarding this very high profile event.
[+] filoleg|9 years ago|reply
"Companies to get" implies future tense, not past. Thus it makes sense the companies have not received them yet. But I agree that confirmation from the companies once they receive would be very nice.
[+] Karunamon|9 years ago|reply
"Assange" the person may not be trustworthy, but Wikileaks the organization he created is, so far, beyond reproach. They have never released false data.
[+] pinaceae|9 years ago|reply
Still waiting for a leak from China or Russia. A bit weird that Wikileaks only targets the US.