As part of the program foreign languages were used to cover up the source of cia hacks.
Wikileaks marble framework.
Marble framework part three of wikileak s cia disclosures which was first made public on march 31 focuses on the agency s anti forensics tools called marble framework.
Today march 31st 2017 wikileaks releases vault 7 marble 676 source code files for the cia s secret anti forensic marble framework.
Wl research community user contributed research based on documents published by wikileaks.
According to the wikileaks press release the marble contains 676 source code files for the cia s secret anti forensic marble framework.
Wikileaks and the marble framework april 1 2017 by renditionsec cyber attribution cyber threat intelligence wikileaks.
Marble framework xxxxx x.
This week wikileaks released cia s marble framework.
Dubbed marble the part 3 of cia files contains 676 source code files of a secret anti forensic marble framework which is basically an obfuscator or a packer used.
Overview objectives and design concepts and vocabulary how it works setting it up for your projects examples documentation troubleshooting and issue reporting.
According to wikileaks it reached 1 0 in 2015 and was used by the cia throughout 2016.
Objectives an obfuscation framework that doesn t require us to copy and paste a lot flexible and provides good coverage.
Marble framework source code marble zip.
As rendition infosec works with many organizations on security and threat intelligence we have been fielding calls asking what the release means for businesses.
Marble is used to hamper forensic investigators and anti virus companies from attributing viruses trojans and hacking attacks to the cia.
The documents describe the marble framework a string obfuscator used to hide text fragments in malware from visual inspection.
Wikileaks wikileaks 31 марта 2017 г.
Marble is used to hamper forensic investigators and anti virus companies from attributing viruses trojans and hacking attacks to the cia.
The marble framework is designed to allow for flexible and easy to use obfuscation when developing tools when signaturing tools string obfuscation algorithms especially those that are unique are often used to link malware to a specific developer or development shop.
Wikileaks published hundreds of more files from the vault 7 series today which it claims show how cia can mask its hacking attacks to make it look like it came from other countries including russia china north korea and iran.