From the documentation, which has been leaked in the last few hours, it follows that the CIA routinely uses different tools to hack Windows computers. The new release that just released Wiki Leaks is composed of a series of 27 documents. These describe what the CIA would have called with the code name “Grasshopper”. One of the most important: create malware aimed at Windows computers.
Within these documents, different keys and tools are offered. It seems that these can be combined according to the needs of the researchers. Although instructions may have been useful in some cases to investigate certain issues, it is clear that the misuse of these weapons can be devastating.
Grasshopper, a set of techniques to hack Windows in fact, they would also be of great help to all those hackers and cybercriminals who want to perfect their technique when creating specific malware for Windows. As detailed in this guide Grasshopper is a set of software tools that can be used to make custom installable files. These can be run on Windows and diversify your way of operating.
The nature of the executable will depend on the needs of the investigator or the cybercriminal who is working for fraudulent purposes. Thus, the system developer can describe the conditions of the attack. Then you can configure the tool so that the files work for the desired objective.
Thus spies the CIA to its objectives
The manuals that have just leaked Wiki Leaks reveal a way of operating the CIA that until now had not been seen it is the system that has these services to access the computers that run Windows, the Microsoft operating system. One of the techniques described here reveals how to get rid of antivirus protection. In addition, among those affected would be specific tools like Microsoft Windows Defender, Symantec.
The most curious of all is that to design this hacking tool, these professionals were based on the operation of Carver. A dangerous Russian malware used by organized crime. As detailed in these documents, the different tools of the Grasshopper code allow a pre-inspection of the installation of the target device. In this way, the system can determine whether to install according to the configuration of the equipment.
It is about being able to customize the intervention on the hacked computer. In addition, bypassing the antivirus restrictions and while the seepage may seem like a shameful discovery about the modus operandi of ICA it is no more than the leaks that came out last week. Documents do not disclose specific operations. Nor do they offer behavior beyond what we can imagine for an organism of these characteristics. More given the objectives pursued and the history revealed by Wiki Leaks itself.