Researchers has announced a study made by them on 40 cyber attacks conducted by LongHorn. The patterns of tools & techniques that were used by the hacker have very close resemblance that are described n Vault 7.
Wikileaks Vault 7 Resemblance in 40 cyber attacks
During this month a very hot topic is raised by Wikileaks. The document released in public by Wikileaks are named as Vault 7. After a team of researchers have studied these documents & they also have a quite interesting story about the tools in cyber attacks.
Also Read : Most Popular Hacking Tools in Kali Linux
Researchers at LongHorn have concluded & relate 40 cyber attacks that were made in 16 countries. According to the these attacks were conducted by a cyber group called LongHorn. They also said that the details in the document of Vault 7 & LongHorn have a very high resemblance. many technical specifications are matched totally.
Conclusion by Symantec Researchers
LongHorn is using Trojans and 0-day bugs attacks to many government firms , telecoms & IT firms since 2010.
After all these conclusion Symantec researchers said in a blog post that Vault 7 activities & LongHorn activities are done by a some group & are somehow related to each other.
Vault 7 has described a tool called FluxWire which is developed on the base of Trojan. Another tool callen Corentry also belongs to LongHorn.
As many features of Corentry and the sample that is shown in Vault 7 document are apparently similar.
Another tool called archangel has a quite similar interface with LongHorn Tool called plexor backdoor.
The cryptographic methods of Vault 7 & Longhorn are also same. This includes AES & 32 bit key one key per connection. This practice prevents from MITM attacks.
LongHorn was first detected in 2014 by Symantec when they were using 0-day exploit to infect the host with plexor. After they analyze the attack , they knew that the attackers have good knowledge about the victim. The tools used in the attacks were Corentry, Plexor,, and .
Before the Vault 7 documents were released, Symantec have assumed the attakers as an informtion gathering group. But after the documents are released , the official statement of Symantec have chnaged & the link has gone through CIA.
They added “Taken in combination, the tools, techniques, and procedures employed by Longhorn are distinctive and unique to this group, leaving little doubt about its link to Vault 7.”
That’s it for now. If you like Google Gboard Tips & tricks, please write a comment for us to let us know. Like us on Facebook or subscribe us to get all the daily updates from us. Thank You.