Breaking News

Samsung Showcases Glasses-Free 3D and HDR10+ GAMING ASRock Z890I Nova WiFi R2.0 Supports CQDIMM GoPro Unveils GP3 Lenovo Unveils Adaptive AI PCs, Modular Concepts, and Lenovo Qira Rollout at MWC 2026 Say hello to MacBook Neo

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

WikiLeaks Says 'Athena' CIA Spying Program Targets All Versions of Windows

WikiLeaks Says 'Athena' CIA Spying Program Targets All Versions of Windows

Enterprise & IT May 21,2017 0

WikiLeaks has published details about Athena/Hera, a spyware framework which "provides remote beacon and loader capabilities on target computers" allegedly being used by the CIA.

According to Wikileaks, the spyware works against every version of Microsoft's Windows operating systems, from Windows XP to Windows 10. It has been designed to take full control over the infected Windows PCs remotely, allowing the agency to perform all sorts of things on the target machine, including deleting data or uploading malicious software, and stealing data and send them to CIA server.

"Once installed, the malware provides a beaconing capability (including configuration and task handling), the memory loading/unloading of malicious payloads for specific tasks and the delivery and retrieval of files to/from a specified directory on the target system. It allows the operator to configure settings during runtime (while the implant is on target) to customize it to an operation," Wikileaks says.

According to the documentation, the malware was developed by the CIA in cooperation with Siege Technologies, a self-proclaimed cyber security company based in New Hampshire, US.

WikiLeaks has not provided any detail about the operations being conducted by the agency using Athena.

In an email from HackingTeam, Jason Syversen, founder of Siege Technologies with a background in cryptography and hacking, "... said he set out to create the equivalent of the military's so-called probability of kill metric, a statistical analysis of whether an attack is likely to succeed. 'I feel more comfortable working on electronic warfare,' he said. 'It's a little different than bombs and nuclear weapons -- that's a morally complex field to be in. Now instead of bombing things and having collateral damage, you can really reduce civilian casualties, which is a win for everybody.'"

Tags: Hacking
Previous Post
Samsung to Showcase 'Stretchable' OLED, Glasses-free 3D OLED At SID 2017
Next Post
Holograms Could be the Future of Near-eye Displays

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

  • Zoom Users' Data have Been on Sale on Dark Web: report

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

Latest News

Samsung Showcases Glasses-Free 3D and HDR10+ GAMING
Gaming

Samsung Showcases Glasses-Free 3D and HDR10+ GAMING

ASRock Z890I Nova WiFi R2.0 Supports CQDIMM
PC components

ASRock Z890I Nova WiFi R2.0 Supports CQDIMM

GoPro Unveils GP3
Cameras

GoPro Unveils GP3

Lenovo Unveils Adaptive AI PCs, Modular Concepts, and Lenovo Qira Rollout at MWC 2026
Enterprise & IT

Lenovo Unveils Adaptive AI PCs, Modular Concepts, and Lenovo Qira Rollout at MWC 2026

Say hello to MacBook Neo
Enterprise & IT

Say hello to MacBook Neo

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed