[Nulled] » Information security » Social Engineering » Suddenly, out of nowhere, the CIA appeared.
January 23 2023

Suddenly, out of nowhere, the CIA appeared.

Suddenly, out of nowhere, the CIA appeared.

Researchers from the Netlab team of the Chinese infosec vendor Qihoo 360 last week released a report on the Hive modification caught in the wild for the first time.

Let's remember what Hive is. In a nutshell, this is a democratic cyberdildo in the service of LGBTQ+ hacktivists, which they insert into the hole of totalitarian regimes unintended for this purpose by nature in order to introduce liberalism and minority rights, an advanced malicious platform developed by the CIA (most likely by its APT Lamberts division) designed to manage infected systems and safely exfiltrate the information contained in them.  

In November 2017, Wikileaks, following the sensational leak of confidential CIA information called Vault 7, staged another similar leak under the logical name Vault 8. And within the framework of Vault 8, Comrade Assange and his team published the source code of the Hive project and the corresponding documentation. 

It is noteworthy that one of the fake certificates that the CIA generated for Hive was a Kaspersky Lab certificate. A kind of sophisticated revenge of the American intelligence community.

Now, after 5 years, Chinese researchers have discovered a RAT, which they called xdr33 and which was modified from the Hive code merged in 2017.

At the same time, Netlab believes that the detected malware does not belong to the CIA, in particular because of the low complexity of the modification and the vulnerability used by N-day (indeed, when it was the Americans who exchanged fresh holes - if 0-day ends, then you can always make fresh ones as part of the next software update).   

In principle, there is nothing supernatural in this, just another private hacking tool of Americans in the service of commercial hackers that has got into the public.  

And so, yes, they mostly have ponies with elves and Masks with Breen. They are thinking how else to make us all happy.

Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

This publication has no comments yet. You can be the first!

Information the publication:

Related News

16 January 2023
Information security
The largest medical

The largest medical facility in Lake Charles (LCMHS), Louisiana was attacked by ransomware, resulting in a leak of

Read more
16 January 2023
Information security
On New Year's Eve, the

On New Year's Eve, the Poles put some cranberry infosec under the Christmas tree. So, on December 30, gov.pl

Read more
16 January 2023
Information security
Group-IB uncovered Dark

Group-IB uncovered Dark Pink APT, involved in attacks on government agencies and military facilities in the

Read more
16 January 2023
Information security
Cryptoplatform 3Commas

Cryptoplatform 3Commas has recognized a cyber incident, as a result of which API keys were stolen. Recently, an

Read more
15 January 2023
Information security
🔓 A free decryptor has

🔓 A free decryptor has appeared for the MegaCortex ransomware Bitdefender has released a tool for decrypting files

Read more

Information

Users of visitor are not allowed to comment this publication.

Site Search

Site Menu


☑ Scripts Software

Calendar

«    May 2024    »
MonTueWedThuFriSatSun
 12345
6789101112
13141516171819
20212223242526
2728293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +4 Total articles 5578
  • +20 Comments 3155
  • +37 Users : 4141