Washington ‘real danger’ of cyber warfare, not China or N. Korea – WikiLeaks

A Kaspersky security specialist at work (Reuters / Sergei Karpukhin)

A Kaspersky security specialist at work (Reuters / Sergei Karpukhin)

The US is engaging in “offensive cyber warfare,” Kristinn Hrafnsson, spokesman for whistleblower organization WikiLeaks, told RT, following the unmasking of a sophisticated hacking ring that has infected thousands of computers in over 30 countries.

“Who is the real criminal?” Hrafnsson asked, during a
live interview with RT. “We have been led to believe that the
real danger of cyber warfare is from China or North Korea. But I
think the real danger here is the US, the superpower. And they
can cause real havoc all over the world with their
technologies.”

READ
MORE: ‘Equation Group’ hackers attacked 30+ nations with
NSA-style tech

On Monday, Moscow-based security firm Kaspersky Labs revealed a
trove of evidence showing that sophisticated surveillance systems
had been embedded in thousands of computers belonging to
officials, scientists, businessmen and journalists in states such
as Russia, Iran and China starting from 2001, by what it called
the Equation Group.

One of the most powerful in a suite of tools used by the team was
a virus that attached itself to the in-built programming
contained on the hard disk of almost every top manufacturer. The
malware allowed the hackers to take over the computer before the
operating system even loaded up for the first time, and has
likely existed at least since 2007.

“We are not surprised. We should not be taken aback by
anything after what we have learned from Edward Snowden, but we
are surprised by the sophistication,”
said the Icelandic
journalist, who has worked with Julian Assange’s WikiLeaks since
2010.

“To go to the core of the computer, which makes it almost
impossible to detect is something that we haven’t seen
before.”

Hrafnsson says the National Security Agency is likely behind the
operation, saying “there is no other agent that has the
ability and the resources to do this.”

ARCHIVE PHOTO: WikiLeaks founder Julian Assange (L) and WikiLeaks spokesperson Kristinn Hrafnsson in Norfolk, England December 16, 2010. (Reuters / Paul Hackett)

The NSA hasn’t admitted sponsoring the Equation Group – which
appears to be lavishly resourced – but circumstantial evidence
points to US involvement. Most of the computers infected are
located in countries that enjoy a rocky relationship with
Washington, while some of the infiltration techniques bear the
hallmarks of other operations where the US has been ostensibly
involved, such as the Stuxnet virus. Two anonymous sources,
formerly with the NSA, also confirmed the existence of the
espionage capabilities described by Kaspersky to Reuters.

‘Today’s NSA top secret techniques are tomorrow’s public hacking
tools’

Acclaimed cryptologist and cyber-security expert Bruce Schneier
also believes that that the uncovered techniques could belong to
the NSA – or its British partner, GCHQ.

“It seems obvious these are NSA techniques – the codenames
are the same, they are very similar to an NSA catalogue that was
revealed by Der Spiegel in December 2013. You look at the targets
list – it’s the list of US enemies. So it seems clear that if
this is not the US, it’s the UK, but it is definitely our side
doing it.”

He says this revelations show what the criminals of tomorrow may
do.

“Right now these are NSA and other military techniques but
today’s top secret programs become tomorrow’s PhD theses, and the
next days’ hacking tools. So what we are seeing in these
military-grade malware is the preview of what criminals are going
to do in 3-5 years and what we are learning is that attack is a
lot easier that defense,”
he told RT.

At the same time, Schneier believes that while government cannot
be expected not to spy at all, techniques like those exposed by
Kaspersky are better than blanket wiretapping because they are
targeted.

“They are not the NSA spying on everybody to get at one
person. They are the NSA targeting legitimate enemies. And that
is really the best we can expect the governments to do. We can’t
expect them to stop spying. We want them to target.”

Karsten Nohl, chief scientist at Security Research Labs in
Berlin, says Kaspersky specialists have provided great insights
into a complex hacking system and obviously spent a lot of time
connecting the puzzle pieces that were available to other
researchers too to paint a devastating picture of a very capable
threat actor that went unnoticed for a long time.

“From all evidence we have seen so far, the US connection
seems quite clear. Lots of evidence like text strings in these
different viruses that we have seen over a whole decade of work
can be linked to other US malware, for instance Stuxnet,”

Nohl told RT.

“And adding to that, who else would have been able to afford
such a comprehensive hacking program 13 years ago, when this
attack started? I think only the US had budgets like this back
then for major hacking of worldwide computer network.”

Leave a comment