U.S. Markets open in 7 hrs 21 mins
  • S&P Futures

    -13.75 (-0.42%)
  • Dow Futures

    -108.00 (-0.40%)
  • Nasdaq Futures

    -64.25 (-0.58%)
  • Russell 2000 Futures

    -7.10 (-0.48%)
  • Crude Oil

    -0.09 (-0.23%)
  • Gold

    +4.60 (+0.24%)
  • Silver

    +0.17 (+0.71%)

    -0.0015 (-0.1293%)
  • 10-Yr Bond

    0.0000 (0.00%)
  • Vix

    +1.95 (+7.55%)

    -0.0021 (-0.1612%)

    +60.11 (+0.58%)
  • CMC Crypto 200

    -12.41 (-5.27%)
  • FTSE 100

    -202.76 (-3.38%)
  • Nikkei 225

    +40.90 (+0.18%)

How the CIA hacks computers that aren’t even connected to the internet

Chris Smith

Air-gapped computers are supposed to be ultra-secure PCs that can’t be infected with malware that spreads with the help of the internet. That’s because of these computers, often connected to sensitive machines, aren’t also connected to the internet. You’d think these systems would be impenetrable by remote attacks and would require a hacker to be in the same room with the PC. But, unsurprisingly, the CIA developed tools that can infect air-gapped computers. 

Don't Miss: Echo Show launches next week, but the Alexa video calling device Amazon copied is available now

Wikileaks on Thursday published more than 150 pages of materials that explain how the CIA used USB drives to sneak malware to the air-gapped machines. After all, even these computers need to exchange data, and the only way to do it is using USB drives or external hard drives.

A platform called Brutal Kangaroo contains tools that can be used to target computer systems not connected to the internet, Ars Technica explains. Drifting Deadline is a tool installed on a computer of interest. When a USB drive is connected to it, the tool will infect it with malware that would then be passed to the air-gapped computer.

These advanced malware versions would be able to infect air-gapped computer immediately after the USB drive is plugged in. Some of them required no user interaction and could be activated by default behaviors in Windows, such as Windows Explorer displaying icons, or the letter corresponding to the thumb drive that was just inserted.

Microsoft said it patched some of these vulnerabilities, and they don’t work on any of the supported versions of Windows.

The documentation says that the first infection — the deployment of Drifting Deadline — might need manual access to a computer, but Ars argues that intrepid hackers could find ways to deliver the malware to the computer that would be used to transmit it to a USB stick.


For more news videos visit Yahoo View, available on iOS and Android.

Trending right now:

  1. Video shows off over 25 new features and changes in Apple’s latest iOS 11 beta

  2. This speaker sounds almost as good as Sonos, but it’s waterproof and less than half the price

  3. The iPhone 8 could have more than one game-changing feature

See the original version of this article on BGR.com