Skip to Content

Wikileaks: ‘Marble’ is proof that CIA disguises hacks as Russian

The Vault 7 release by WikiLeaks contains a series of documents, named "Marble", detailing how CIA hacking tactics misdirect forensic investigators from attributing viruses, trojans and attacks.

Published: April 1, 2017, 9:36 am

    Read more

    After the release of “Year Zero” and “Dark Matter”, WikiLeaks has now released the third batch of stolen CIA documents. It doesn’t focus on tech companies, but on the American spy agency itself.

    Previous Vault7 releases have revealed the CIA’s ability to mask its hacking fingerprints. It has now been revealed how the CIA inserts code fragments in foreign languages, and the tactic has been in use as recently as 2016.

    According to the WikiLeaks release: “The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.”

    By doing so, it creates a means for virus writers to pretend that the malware was created by a speaker of a range of foreign languages. But not any foreign languages of course, because the languages are those of the US’s main cyber-adversaries – Russia, North Korea, China and Iran.

    WikiLeaks suggests that this tech would trick security analysts to into thinking they were, for example, dealing with the Russians or the Chinese PLA.

    The whistleblower believes that potentially “thousands” of cyber attacks could thus be attributed to the CIA, while the blamed is wrongly placed on foreign governments, noting that the CIA technique is the digital equivalent of a tool which disguises the English text on US produced weapons systems before they are provided to insurgents.

    WikiLeaks said Marble is able to hide fragments of texts that would allow for the author of the malware to be identified, “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer.

    The source code released reveals Marble contains test examples in Russian, Korean, Arabic, Chinese and Farsi.

    “This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” according to WikiLeaks, “But there are other possibilities, such as hiding fake error messages.”

    The code also contains a “deobfuscator” which allows the CIA text obfuscation to be reversed. “Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.”

    “Marble forms part of the CIA’s anti-forensics approach. […] This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

    “The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.”

    The Marble release appears authentic because WikiLeaks used “primary source documents,” John Kiriakou, former CIA analyst and whistleblower, told RT.

    The first set of leaks, released on 7 March, described exploits used to compromise vulnerable Android devices, Apple iPhones, Samsung TVs, Windows PCs, and Macs.

    Two weeks later, it leaked how the CIA was able to buy Apple Macs and iPhones, install spyware on them, and give them to targets. WikiLeaks spun this to suggest this might be happening in the factory, but the suggestion was unsupported by the leaked documents.

    El Reg has independently confirmed that Assange and his co-workers have entered into talks with Microsoft, unlike whistleblower Edward Snowden, who unequivocally shared all the documents with the public without making any demands to the publications or companies.

    Keep ​your language polite​. Readers from many different countries visit and contribute to Free West Media and we must therefore obey the rules in​,​ for example​, ​Germany. Illegal content will be deleted.

    If you have been approved to post comments without preview from FWM, you are responsible for violation​s​ of​ any​ law. This means that FWM may be forced to cooperate with authorities in a possible crime investigation.

    If your comments are subject to preview ​by FWM, please be patient. We continually review comments but depending on the time of day it can take up to several hours before your comment is reviewed.

    We reserve the right to del​ete​ comments that are offensive, contain slander or foul language, or are irrelevant to the discussion.

    Americas

    Battle of Berkeley: Patriots and Antifa in Weimar-style clashes

    America is increasingly resembling 1920s Germany (the so-called Weimar Republic) as physical fights erupt between pro- and anti-Trump supporters.

    Democrat globalist banker is now shaping Trump policy

    WashingtonGary Cohn, a Democrat and dyslexic former Goldman Sachs banker, is currently running the White House with president Trump's blessing, Reuters reported.

    Will China, North Korea back down after Trump’s threats?

    WashingtonDonald Trump's strategy behind the latest US belligerent moves to frighten the Chinese into abandoning North Korea might not be the greatest idea.

    Trump allowing twice as many Syrian refugees as Obama

    WashingtonDuring his 2016 presidential campaign, Donald Trump called Syrian refugees a “great Trojan horse” but his administration has allowed them into the US in larger numbers than did President Barack Obama.

    American patriots who voted against war abandon Trump

    WashingtonStunned prominent American patriotic writers and bloggers have turned on the president in which they had put their trust.

    Israeli arrested in connection with anti-Jewish bomb threats

    An Israeli-American teenager was arrested in Israel by the FBI for being behind a flood of false anti-Semitic bomb threats.

    ‘Delusional’ report on Russian hacking in Ukraine

    The cyber-security company Crowdstrike has claimed that "Russia" hacked artillery units of the Ukrainian army, but the claim is completely baseless and false. The Crowdstrike report, released in December, asserted that the hack into a Ukrainian artillery app, resulted in heavy losses of howitzers in Ukraine’s war against the Donbass.

    US Secretary of State Tillerson to skip NATO meeting and visit Russia instead

    WashingtonWhile NATO is continuing to drag its manpower to Russia's western borders, the US Secretary of State Rex Tillerson, is heading to Russia instead.

    Monsanto, EPA colluded to kill cancer findings

    WashingtonThe chemical powerhouse Monsanto's controversial herbicide, Roundup is carcinogenic, court documents revealed.

    WikiLeaks exposes CIA’s global covert hacking program

    The latest WikiLeaks' bombshell of CIA hacking practices, known as Vault 7 has been a wake-up call for computer users and IT giants.

    Go to archive