The release Friday of the CIA’s “Marble Framework” comes less than a month after the WikiLeaks dumped onto the Internet a trove of files — dubbed “Vault 7” — that described the type of malware and methods the CIA uses to gain access to targets’ phones, computers and other electronic devices.
“This appears to be one of the most technically damaging leaks ever done by WikiLeaks, as it seems designed to directly disrupt ongoing CIA operations and attribute previous operations,” said Nicholas Weaver, a computer security researcher at the University of California at Berkeley.
The material includes the secret source code of an “obfuscation” technique used by the CIA so its malware can evade detection by anti-virus systems. The technique is used by all professional hackers, whether they work for the National Security Agency, Moscow’s FSB security agency or the Chinese military. But because the code contains a specific algorithm — a digital fingerprint of sorts — it can now be used to identify CIA hacking operations that had previously been detected but not attributed.