Hacking air-gapped machines—computers that are not connected to the internet, so theoretically less vulnerable—is always pretty interesting. On Wednesday, Wikileaks published a series of alleged CIA documents that supposedly show how the intelligence agency’s malware was designed to infect these sort of targets.
By Joseph Cox | MOTHERBOARD
According to one of the documents, „Brutal Kangaroo is a tool suite for targeting closed networks by air gap jumping using thumbdrives.“ The 11 files allegedly come from the CIA’s Engineering Development Group, and appear to date from 2012 to 2016.
In short, a CIA operator first remotely installs a piece of malware on a system connected to the internet, the „primary host.“ Then, an unwitting user inserts a USB drive into that system, and the malware infects the drive. The user then, hopefully, plugs that infected USB into an air-gapped computer unavailable to the CIA. The malware does whatever it has been configured to carry out, and sends any data back to the CIA once it is plugged into the primary host again.
Once the malware has infected a target, Brutal Kangaroo sets up its own „custom covert network“ within the air-gapped computers, and can collect files, survey the victim machines, launch its own executables, and more, according to one of the documents. The malware can also delete a predetermined list of files, one of the documents adds.