When firewalls, network-monitoring services, and antivirus software aren’t enough, there’s always been one surefire way to protect computers that control sensitive operations like power grids and water pumps: cut them off from the internet entirely. But new documents published by WikiLeaks on June 22 suggest that even when such extreme measures are taken, no computer is safe from motivated, well-resourced hackers.

The 11 documents describe a piece of software called “Brutal Kangaroo,” a set of tools built for infiltrating isolated, “air-gapped” computers by targeting internet-connected networks within the same organization. It’s the latest publication in the “Vault 7” series of leaked documents, which describe myriad hacking tools WikiLeaks says belong to the US Central Intelligence Agency (CIA).

Brutal Kangaroo works by creating a digital path from an attacker to an air-gapped computer and back. The process begins when a hacker remotely infects an internet-connected computer in the organization or facility being targeted. Once it has infected that first computer, what the documents refer to as the “primary host,” Brutal Kangaroo waits. It can’t spread to other systems until someone plugs a USB thumb drive into that first one.

HOT TOPIC: US Intelligence director: “AI will replace 75 percent of spies”

Once someone does, malware specific to the make and model of the thumb drive is copied onto it, hiding in modified LNK files that Microsoft Windows uses to render desktop icons, and in DLL files that contain executable programs. From this point, Brutal Kangaroo will spread further malware to any system that thumb drive is plugged into. And those systems will infect every drive that’s plugged into them, and so on, and the idea is that eventually one of those drives will be plugged into the air-gapped computer.

  • Disqus-helpsGOVTbreaklaws&kill

    wipe the FBI hard drives clean..like with a cloth..
    lois lerner.. the IR$ dog ate the hard drives.

    obama gate
    Oct 25, 2016 – : Clinton Emails Indicate Justice Roberts Intimidated Over Obamacare … to force a last minute switch of opinion by Chief Justice John Roberts,

    FBI Comey .Has ‘Repeatedly and Improperly Protected Clinton and Her Top People From Consequences of Criminal Behavior’

    scalia…. caught Obama & Hilary spying on the supreme court , which invalidates all supreme court rulings

    ……….all taxpayer funded public employee labor unions …working against the American taxpayer…

    • collette.robert@yahoo.com

      I had a hard drive. I had worked for twelve hours and then had a three hour drive. I couldn’t smoke the joint and was saving it to smoke with my wife anyway. I had the window down, yelling and screaming and pouring water on my head. The light was red but I was in that zone and just hammered it, was that you? Sorry

  • NazdaPokmov

    I sincerely doubt that any computer NOT hooked up to the internet can be accessed. This makes no sense whatsoever.

    • collette.robert@yahoo.com

      Some things are like that bitch

    • J.M.

      Another way is to identify an air gapped computer, infiltrate location and install special software. Once software is installed then signal and data can be transmitted by fluctuating fan speed. Any device in area which has,a,speaker and is connected to internet can listen to fan. The frequency fluctuations are actually data transmissions.

  • John Hankinson

    Good, they can watch me through the webcam while I jack off to porn.

    • collette.robert@yahoo.com

      Get a good acne medication, and your foreplay is lame

  • collette.robert@yahoo.com

    Hack this bitch. I don’t give a fuck what you jews hack, you are morons and trash and I am taking you out

  • Rob Royy