CIA false flag team repurposed Shamoon data wiper, other malware

The code reuse was meant to reduce costs of development, but to also make the agency's malware blend in with other threats

The U.S. Central Intelligence Agency documents published by WikiLeaks Tuesday shows that one of the agency's teams specializes in reusing bits of code and techniques from public malware samples.

According to the leaked documents the Umbrage team is part of the Remote Development Branch under the CIA's Center for Cyber Intelligence. It maintains a library of techniques borrowed from in-the-wild malware that could be integrated into its own projects.

Doing this has two benefits: One is that it lowers the cost and time needed to develop tools internally to achieve the same goals. The second is that it makes the agency's malware tools resemble those of others, possibly confusing malware analysts as to the origin attacks and causing others to be blamed for the agency's false flag operations.

For example, one of the techniques borrowed by Umbrage was the file wiping implementation in Shamoon, a cybersabotage program that was used to destroy data from 30,000 computers at Saudi Arabia's national oil company in 2012. The group behind this malware has recently returned with new attacks.

The first version of Shamoon abused a commercial, digitally-signed driver called RawDisk developed by a company named Eldos. Once installed on a system, this driver allows applications to overwrite files even if they are locked by the OS.

The Umbrage team analyzed how the Shamoon authors bypassed the license check for the RawDisk driver and implemented the same disk wiping technique in their own component dubbed Rebound.

It's possible that an antivirus program or a malware analyst encountering Rebound in the wild would identify it as a Shamoon variation instead of an entirely separate malware program.

The CIA team's repository includes many other techniques and code snippets obtained from known malware that can be used for data collection, persistence, stealth, antivirus bypass, privilege escalation and system surveying.

For example, there's a persistence technique borrowed from the HiKit rootkit, two anti-sandboxing techniques borrowed from Trojan Upclicker and Nuclear Exploit Pack, and a webcam capture technique borrowed from the DarkComet RAT. Other documented techniques only have "known malware" as listed source without the malware being specifically named.

Not all of the techniques in Umbrage's repository have been repurposed for internal projects, but some have. While the code names for these internal projects are listed, there's little information in the leaked files about what they actually do.

The exception is a tool called Sandshark which is mentioned in another document as a "Listening Post" software. For others, some of their functionality can be inferred from the techniques they borrowed.

The Umbrage team was also interested in the code leaked in 2015 from an Italian surveillance software company called Hacking Team. The company sold surveillance software for Windows, macOS, Linux and mobile operating systems to law enforcement and intelligence agencies. In some cases it also provided the exploits needed to remotely install the software on the targeted devices.

The leaked Umbrage documents suggest that the CIA's review effort first focused on the implementation of Hacking Team's "implants" for the Windows platform. The findings were interesting enough that the effort was later expanded to the full data dump and the code for all platforms.

There's no indication whether any of the code was actually repurposed in the end, but some comments in the the Umbrage internal wiki suggest that this was definitely a possibility.

"If one is interested in using some implementations found in the source code, it should be considered a best practice to extract the desired pieces, and thoroughly review and test the extracted pieces," the person who led the review wrote.

Planting false flags in malware is not a new development and it's one of the reasons why establishing accurate attribution for cyberattacks is nearly impossible. Seasoned malware analysts are always skeptical when someone attributes a cyberespionage campaign to a specific group or country with a high degree of confidence.

In October, researchers from Kaspersky Lab published a paper on the incidents of false flags in cyberespionage operations. Groups that are well known for such tactics include: APT28/Pawn Storm/Sofacy, the Russian cyberespionage group responsible for hacking into the U.S. Democratic National Committee last year and which some believe is linked to Russia's military intelligence agency -- the GRU; The Lazarus group, which some believe is linked to North Korea; Turla, another Russian origin cyberespionage group and Duqu, which is suspected to hail from Israel.

Ironically, the leaked CIA documents that specify which techniques the Umbrage team used might now actually help antivirus companies home in on the malware programs developed by the agency.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles


PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?