Sat. Aug 2nd, 2025

WikiLeaks: How the CIA Disguises Its Hacking to Appear to Be Foreign

CIA Headquarters Podium

Friday morning, WikiLeaks released the third of its “Vault 7” data and document dumps related to CIA hacking.

This latest drop, codenamed “Marble,” features 676 source code files for the CIA’s secret anti-forensic Marble Framework, which was used to hamper forensic investigators and anti-virus companies from attributing viruses, Trojans and hacking attacks to the CIA. It did this by hiding fragments of text used in its malware from visual inspection.

“This is the digital equivalent of a specialized CIA tool to place covers over the English-language text on U.S.-produced weapons systems before giving them to insurgents secretly backed by the CIA,” the anti-secrecy group stated in a press release announcing the drop. “Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is ‘[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.'”

WikiLeaks claims the Marble source code also includes a “deobfuscator” to reverse the hidden text. This, along with other revealed techniques, patterns and signatures, can be used by forensic investigators to correctly attribute previous hacking attacks and viruses to the CIA.

According to the group’s statement, the U.S. spy agency can make the attacks appear to be Russian, Chinese, North Korean, Saudi Arabian or Iranian.

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, but there are other possibilities, such as hiding fake error messages,” it stated. “The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.”

This latest release follows the group’s second release, codenamed “Dark Matter,” by a little more than a week. In that statement, the group exposed how the CIA has infected Apple Mac firmware used on both computers and smartphones since at least 2008. {eoa}

By

Leave a Reply

By submitting your comment, you agree to receive occasional emails from [email protected], and its authors, including insights, exclusive content, and special offers. You can unsubscribe at any time. (U.S. residents only.)

Your email address will not be published. Required fields are marked *

Related Podcasts

More News
The Lord’s Prayer and Cultural Change
The Lord’s Prayer and Cultural Change
I Found God In My Children’s Eyes
I Found God In My Children’s Eyes
5 Sins That Open the Door to Demons, and How to Shut Them for Good
5 Sins That Open the Door to Demons, and How to Shut Them for Good
5 Signs You’re Falling Into End-Times Deception and Don’t Even Know It
5 Signs You’re Falling Into End-Times Deception and Don’t Even Know It
Why Grace Is the Most Underrated Weapon in the Christian Life
Why Grace Is the Most Underrated Weapon in the Christian Life
Warning to the Church: Gossip is Quenching the Fire of the Holy Spirit
Warning to the Church: Gossip is Quenching the Fire of the Holy Spirit
Perry Stone Reveals Hidden Battles Ministries Face
Perry Stone Reveals Hidden Battles Ministries Face
A Vision of Hell: What This Woman Saw After Her Car Accident
A Vision of Hell: What This Woman Saw After Her Car Accident
What Set This Revelation Church Apart from the Others?
What Set This Revelation Church Apart from the Others?
Rescued From the Pit
Rescued From the Pit
previous arrow
next arrow
Shadow

Latest Videos
113K Subscribers
1.3K Videos
12.6M Views

Copy link