{"id":1116,"date":"2023-01-03T09:58:59","date_gmt":"2023-01-03T09:58:59","guid":{"rendered":"https:\/\/techinsight.net\/2017\/06\/the-cia-in-your-pc\/"},"modified":"2023-01-03T09:58:59","modified_gmt":"2023-01-03T09:58:59","slug":"athena-malware-the-cia-in-your-pc","status":"publish","type":"post","link":"https:\/\/techinsight.net\/malware-threats\/athena-malware-the-cia-in-your-pc\/","title":{"rendered":"Athena Malware: The CIA in Your PC"},"content":{"rendered":"<p>If you\u2019ve seen a suspense\/thriller movie lately, a lot of them have to do with government authorities taking control of different private sector systems, and usually with nefarious purposes. Until recently, that\u2019s seemed a little far-fetched, and perhaps a product of the conspiracy theorist groups out there. However, the news this week seems to indicate that it isn\u2019t that far-fetched after all. \u00a0Wikileaks has recently exposed\u00a0a CIA malware project, which, at face value, sounds like a cool project but at the same time might give you goose bumps if you\u2019re one of those using a Windows OS. This CIA malware project Athena is designed for spying and hacking. Athena malware is the brainchild of CIA and Siege Technologies, a company located in New Hampshire, US.<\/p>\n<p><a href=\"https:\/\/www.apple.com\">Apparently<\/a>, the Athena malware can hijack\u00a0Windows versions starting from XP to Windows 10, and everything in between. This malware also consists of an additional module called Hera, which affects PCs running Windows 8 to Windows 10.\u00a0 The capabilities of Athena malware are mind blowing. Once Athena malware is set on the target system, it can decode remote configuration and task handling.\u00a0 It can load or unload memories of NOD Persistence Specification DLLs. In addition, it can deliver and retrieve information to and from any directory.\u00a0 These tools would give control of machines to the CIA completely and they definitely highlight the power of what technology can do. However, at the same time it also gives us a reason to pause and think of the impact of its power.\u00a0 And if you think this level of government control is concerning, here is the most concerning part of all &#8211; it lets the operator configure during runtime on the system and thus cannot be detected. The malware can be delivered in a number of different ways including remotely, through a supply chain, through an asset on the ground, or with a program called Windex (which was explained in earlier WikiLeaks releases).<\/p>\n<p>The Siege Technology founder <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2014-05-02\/us-contractors-scale-up-search-for-heartbleed-like-flaws\">said<\/a> in an interview in 2014, &#8220;I feel more comfortable working on electronic warfare,&#8221; he said. &#8220;It&#8217;s a little different than bombs and nuclear weapons &#8212; that&#8217;s a morally complex field to be in. Now instead of bombing things and having collateral damage, you can really reduce civilian casualties, which is a win for everybody.\u201d The contractor sees the value of cyber warfare on this sort of scale as a way to control the on-the-ground warfare and limit damage and casualties to civilian populations.<\/p>\n<p>Whether this new malware is used or not, the reality that all the Windows OS machines in the world can be pretty easily turned into CIA hand puppets is a little disconcerting. Whatever your views on net neutrality and net privacy, this new report from Wikileaks will make you pause and think. Further, such powerful tools in the hands of those who are not seeking international security could be a massive danger and risk for the world populace. The CIA justifies this, but is clearly upset by the recent disclosure.<\/p>\n<p>Check out some more Malware related articles <a href=\"https:\/\/techinsight.net\/category\/security\/malware-threats\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve seen a suspense\/thriller movie lately, a lot of them have to do with government authorities taking control of different private sector systems, and usually with nefarious purposes. Until recently, that\u2019s seemed a little far-fetched, and perhaps a product of the conspiracy theorist groups out there. However, the news this week seems to indicate [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":1117,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[42,50],"tags":[],"class_list":{"0":"post-1116","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-malware-threats","8":"category-privacy"},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts\/1116"}],"collection":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/comments?post=1116"}],"version-history":[{"count":0,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts\/1116\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/media\/1117"}],"wp:attachment":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/media?parent=1116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/categories?post=1116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/tags?post=1116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}