Tuesday, Oct 20, 2020 | Last Update : 05:54 AM IST

195th Day Of Lockdown

Maharashtra1443409114960338084 Andhra Pradesh7192566588755981 Karnataka6406615157829286 Tamil Nadu6088555529389653 Uttar Pradesh4031013468595864 Delhi2827522506135401 West Bengal2603242287555017 Odisha222734190080912 Kerala204242131048772 Telangana1992761701091163 Bihar178882164537888 Assam169985139977655 Gujarat1332191132403417 Rajasthan1288591077181441 Haryana1237821059901307 Madhya Pradesh117588932382207 Punjab107096840253134 Chhatisgarh9856566860777 Jharkhand7770964515661 Jammu and Kashmir69832495571105 Uttarakhand4533233642555 Goa3107125071386 Puducherry2548919781494 Tripura2412717464262 Himachal Pradesh136799526152 Chandigarh112128677145 Manipur9791760263 Arunachal Pradesh8649623014 Nagaland5768469311 Meghalaya5158334343 Sikkim2707199431 Mizoram178612880
  Technology   In Other news  11 Apr 2017  Symantec points usage of leaked CIA spy toolkit in 40 operations

Symantec points usage of leaked CIA spy toolkit in 40 operations

AP
Published : Apr 11, 2017, 11:18 am IST
Updated : Apr 11, 2017, 11:18 am IST

The computer security firm confirms Middle East countries to be the most popular targets for the leaked spy software.

Symantec claims that the attack had been done by Longhorn, famous for theit cyber attacks on government as well as private sector organizations.
 Symantec claims that the attack had been done by Longhorn, famous for theit cyber attacks on government as well as private sector organizations.

When the spying toolkit from CIA was leaked early March on WikiLeaks, the world raised its brows over the possibility of leaking top secret stuff from one of the most advanced intelligence agencies of the world; with the US President Donald Trump embarrassingly admitting that the “CIA was hacked and a lot of things taken”. Now, computer security firm Symantec points towards the use of that leaked spying software in as many as 40 spying operations.

In one of Symantec’s blog post, it was stated that the tools released on WikiLeaks’ website have been found to be linked to activities related to electronic infiltration of international, financial, energy and aerospace organizations across the world. "I will say, in terms of the regions, the largest region represented in terms of those targets was the Middle East," O'Brien said in a telephone interview.

 

It is to be noted that the word “CIA” hasn’t been used anywhere in Symantec’s blog post. O’Brien stressed that the assessment was right but they couldn’t zero-in on a specific government agency as it would be “outside their area of expertise”. Symantec, like other security firms, performs any assessment based on data sourced from its clients. However, it is very obvious that Symantec is indicating to the tools leaked on WikiLeaks recently.

Symantec has been protecting its clients from a group called Longhorn that uses a range of back door Trojans in addition to zero-day vulnerabilities to compromise its targets. Longhorn has infiltrated many government organizations as well as affected the financial, telecom, energy, aerospace, information technology, education, and natural resources sectors.

 

Symantec claims that one computer in the US was found to be “compromised” by the hacking toolkit, after which it was uninstalled within hours, thus indicating an accidental infection.

Tags: wikileaks, cia, cia leaks, symantec