Skip to Content

Wikileaks: ‘Marble’ is proof that CIA disguises hacks as Russian

The Vault 7 release by WikiLeaks contains a series of documents, named "Marble", detailing how CIA hacking tactics misdirect forensic investigators from attributing viruses, trojans and attacks.

Published: April 1, 2017, 9:36 am

    Read more

    After the release of “Year Zero” and “Dark Matter”, WikiLeaks has now released the third batch of stolen CIA documents. It doesn’t focus on tech companies, but on the American spy agency itself.

    Previous Vault7 releases have revealed the CIA’s ability to mask its hacking fingerprints. It has now been revealed how the CIA inserts code fragments in foreign languages, and the tactic has been in use as recently as 2016.

    According to the WikiLeaks release: “The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.”

    By doing so, it creates a means for virus writers to pretend that the malware was created by a speaker of a range of foreign languages. But not any foreign languages of course, because the languages are those of the US’s main cyber-adversaries – Russia, North Korea, China and Iran.

    WikiLeaks suggests that this tech would trick security analysts to into thinking they were, for example, dealing with the Russians or the Chinese PLA.

    The whistleblower believes that potentially “thousands” of cyber attacks could thus be attributed to the CIA, while the blamed is wrongly placed on foreign governments, noting that the CIA technique is the digital equivalent of a tool which disguises the English text on US produced weapons systems before they are provided to insurgents.

    WikiLeaks said Marble is able to hide fragments of texts that would allow for the author of the malware to be identified, “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer.

    The source code released reveals Marble contains test examples in Russian, Korean, Arabic, Chinese and Farsi.

    “This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” according to WikiLeaks, “But there are other possibilities, such as hiding fake error messages.”

    The code also contains a “deobfuscator” which allows the CIA text obfuscation to be reversed. “Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.”

    “Marble forms part of the CIA’s anti-forensics approach. […] This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

    “The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.”

    The Marble release appears authentic because WikiLeaks used “primary source documents,” John Kiriakou, former CIA analyst and whistleblower, told RT.

    The first set of leaks, released on 7 March, described exploits used to compromise vulnerable Android devices, Apple iPhones, Samsung TVs, Windows PCs, and Macs.

    Two weeks later, it leaked how the CIA was able to buy Apple Macs and iPhones, install spyware on them, and give them to targets. WikiLeaks spun this to suggest this might be happening in the factory, but the suggestion was unsupported by the leaked documents.

    El Reg has independently confirmed that Assange and his co-workers have entered into talks with Microsoft, unlike whistleblower Edward Snowden, who unequivocally shared all the documents with the public without making any demands to the publications or companies.

    Keep ​your language polite​. Readers from many different countries visit and contribute to Free West Media and we must therefore obey the rules in​,​ for example​, ​Germany. Illegal content will be deleted.

    If you have been approved to post comments without preview from FWM, you are responsible for violation​s​ of​ any​ law. This means that FWM may be forced to cooperate with authorities in a possible crime investigation.

    If your comments are subject to preview ​by FWM, please be patient. We continually review comments but depending on the time of day it can take up to several hours before your comment is reviewed.

    We reserve the right to del​ete​ comments that are offensive, contain slander or foul language, or are irrelevant to the discussion.

    Americas

    Democratic governor invents conservative ‘weapons caches’ story

    CharlottesvilleIt seems the Democratic governor of the US state of Virginia, Terry McAuliffe, invented a story about "caches of weapons" being stashed around Charlottesville by conservatives in advance of the recently held Unite the Right rally.

    Tech companies move to take down alt-right websites from Internet

    The blacklisting on the Internet of alt-right and conservative sites by US tech companies, has begun in all earnest.

    Why did the police not intervene in Charlottesville?

    Charlottesville, VirginiaPolice and the National Guard outnumbered Unite the Right [UTR] participants in Charlottesville, Virgina, by 2:1, but somehow they still let the situation get out of hand with one person killed and several injured.

    #UniteTheRight gathering ends in chaos with one death as Charlottesville police stand down

    Lack of police protection for alt-right marchers in Charlottesville, Virginia led to the cancellation of speeches in front of the beleaguered statue of General Robert E. Lee, soon to be removed.

    Google fires engineer for memo based on gender science

    After Google fired James Damore, author of a manifesto defending a fact-based, scientific approach to the alleged gender gap in tech, many Google employees spoke out in support of his manifesto.

    Half of Detroit’s mayoral candidates have a violent criminal past

    DetroitHalf of all mayoral hopefuls on Detroit’s primary list of candidates have been convicted of crimes involving drugs, assault or weapons, a Detroit News analysis revealed.

    Black murders soar in US’s most gun controlled city

    ChicagoChicago has reached more than 400 murders for the year so far, outpacing 2016, which was one of the bloodiest years recorded in decades.

    Generals take over Trump White House

    New White House Chief of Staff Gen. John Kelly was appointed to "bring order" to the White House and to the US administration. The New York Times reported that Kelly “made it clear” that he would be imposing a strict line of command.

    Pentagon offers plan to arm Ukraine escalating tensions with Russia

    WashingtonThe United States Military-Industrial Complex plan to escalate tensions with Russia and supply Ukraine with antitank missiles and other advanced weaponry.

    Pentagon dumps millions on mind-control project

    The Pentagon’s research arm — the Defense Advanced Research Projects Agency, or DARPA — has just been given $65 million of American taxpayer money to develop a direct link between a human brain and a computer.

    Go to archive