icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm
23 Mar, 2017 22:44

#DarkSeaSkies: CIA’s tool to hack MacBook Air in under 29 seconds exposed

#DarkSeaSkies: CIA’s tool to hack MacBook Air in under 29 seconds exposed

Amidst WikiLeaks’ revelations about the CIA’s capabilities to hack into Apple products is DarkSeaSkies – a tool used to monitor and control MacBook Air that’s physically installed by a CIA agent or asset in “less than 29 seconds.”

READ MORE: Apple’s achilles heel: CIA hacks MacBook computers with ‘Sonic Screwdriver’

DarkSeaSkies is a tool that runs in the background of a MacBook Air to allow the CIA command and control laptops. It is delivered via “supply chain intercept or a gift to the target.”

It’s loaded onto a MacBook via booting through a thumb drive. The CIA’s user document explains: “It is assumed that an operator or asset has one-time physical access to the target system and can boot the target system to an external flash drive.”

A 2009 “user requirements” document on DarkSeaSkies explains it was created to allow the CIA to access a MacBook Air.

The CIA’s COG [Computer Operations Group] had a “time-sensitive operational need” to install the Nightskies tool onto a MacBook Air, as the CIA had an “opportunity to gift a MacBook Air to a target that will be implanted with this tool.” It’s unknown who this target was.

DarkSeaSkies Components

DarkSeaSkies is actually made up of three components, Dark Matter, SeaPea and NightSkies.

DarkMatter is installed in a computer’s kernal-space (core of computer’s operating system, usually in protected area of memory). It then installs the other two components of the tool, SeaPea and NightSkies.

SeaPea is installed in the kernal and executes and hides NightSkies, which is implanted in the user the space (computer’s memory area that deals with apps and software).

“All files, network connections, and processes associated with the NightSkies beacon are hidden by the SeaPea root-kit,” the document reads.

NightSkies is the beaconing tool used to monitor and send information from the phone to a Listening Post (LP), which collects the incoming data.

Physical access is required to install DarkSeaSkies and the target must have “at minimum occasional internet access” to communicate with a CIA LP. If it’s unable to communicate with a LP, it will eventually delete itself from the system.

The good news is, at least back in 2009, DarkSeaSkies would not persist in the event of a firmware update, according to the CIA’s documents.

A document dealing with test procedures for DarkSeaSkies references a “MacBook Air out of the box” and explains how to install DarkSeaSkies, “run through the wizard to setup the MacBook for the first time. While you’re going through the setup you need to ensure that you set the clock to the current date and time. Disable the wireless card and the Bluetooth card.”

Under “observations,” it’s noted that the tool can be installed in “less than 29 seconds.”

“It takes roughly 23 seconds to get to where you can choose the thumb drive as the boot device and 6 seconds for the tool to install and power off the machine,” the document reads.

Podcasts
0:00
27:33
0:00
28:1