Home > Latest Tech > Researchers have found close resemblance 40 Cyber Attacks & Wikileaks Documents

Researchers have found close resemblance 40 Cyber Attacks & Wikileaks Documents

40 cyber attacks

Researchers has announced a study made by them on 40 cyber attacks conducted by LongHorn. The patterns of tools & techniques that were used by the hacker have very close resemblance that are described n Vault 7.

Wikileaks Vault 7 Resemblance in 40 cyber attacks

During this month a very hot topic is raised by Wikileaks. The document released in public by Wikileaks are named as Vault 7. After a team of researchers have studied these documents & they also have a quite interesting story about the tools in cyber attacks.

Also Read : Most Popular Hacking Tools in Kali Linux

Researchers at LongHorn have concluded & relate 40 cyber attacks that were made in 16 countries. According to the these attacks were conducted by a cyber group called LongHorn. They also said that the details in the document of Vault 7 & LongHorn have a very high resemblance. many technical specifications are matched totally.

40 cyber attacks
40 cyber attacks

Conclusion by Symantec Researchers

LongHorn is using Trojans and 0-day bugs attacks to many government firms , telecoms & IT firms since 2010.

After all these conclusion Symantec researchers said in a blog post that Vault 7 activities & LongHorn activities are done by a some group & are somehow related to each other.

Vault 7 has described a tool called FluxWire which is developed on the base of Trojan. Another tool callen Corentry also belongs to LongHorn.

As many features of Corentry and the sample that is shown in Vault 7 document are apparently similar.

Another tool called archangel has a quite similar interface with LongHorn Tool called plexor backdoor.

The cryptographic methods of Vault 7 & Longhorn are also same. This includes AES & 32 bit key one key per connection. This practice prevents from MITM attacks.

LongHorn was first detected in 2014 by Symantec when they were using 0-day exploit to infect the host with plexor. After they analyze the attack , they knew that the attackers have good knowledge about the victim. The tools used in the attacks were Corentry, Plexor, Backdoor.Trojan.LH1, and Backdoor.Trojan.LH2.

Before the Vault 7 documents were released, Symantec have assumed the attakers as an informtion gathering group. But after the documents are released , the official statement of Symantec have chnaged & the link has gone through CIA.

They added “Taken in combination, the tools, techniques, and procedures employed by Longhorn are distinctive and unique to this group, leaving little doubt about its link to Vault 7.”

Also Read : What is the best way to backup your Smartphone data -Android phone or iPhone

That’s it for now. If you like Google Gboard Tips & tricks, please write a comment for us to let us know. Like us on Facebook or subscribe us to get all the daily updates from us. Thank You.

11 thoughts on “Researchers have found close resemblance 40 Cyber Attacks & Wikileaks Documents

  1. Hey There. I found your blog using msn. This is a really well written article. I’ll make sure to bookmark it and return to read more of your useful information. Thanks for the post. I will certainly comeback.

  2. I’m starting a blog soon but have no coding experience so I wanted to get advice from someone with experience. Any help would be greatly appreciated!

  3. Great goods from you, man. I’ve understand your stuff previous to and you are just extremely excellent. I really like what you have acquired here, really like what you’re stating and the way in which you say it. You make it entertaining and you still take care of to keep it smart. I cant wait to read far more from you. This is actually a terrific web site.

  4. The signature of CIA Attack & the cyber attack , ransomware are connected to each other , I could be wrong tell your opinions

  5. Thanks for your personal marvelous posting! I seriously enjoyed reading it, you’re a great author.I will ensure that I bookmark your blog and will often come back later in life. I want to encourage you to continue your great writing, have a nice afternoon!

  6. This could be connected point where CIA & some other hacker association have done something with their joint efforts

  7. Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your weblog? My blog is in the exact same niche as yours and my visitors would certainly benefit from some of the information you provide here. Please let me know if this okay with you. Cheers!|

  8. I do accept as true with all the concepts you have introduced to your post. They’re really convincing and can certainly work. Nonetheless, the posts are too short for beginners. Could you please extend them a little from next time? Thanks for the post.

Leave a Reply

Your email address will not be published. Required fields are marked *