Researchers have found close resemblance 40 Cyber Attacks & Wikileaks Documents

Researchers has announced a study made by them on 40 cyber attacks conducted by LongHorn. The patterns of tools & techniques that were used by the hacker have very close resemblance that are described n Vault 7.

Wikileaks Vault 7 Resemblance in 40 cyber attacks

During this month a very hot topic is raised by Wikileaks. The document released in public by Wikileaks are named as Vault 7. After a team of researchers have studied these documents & they also have a quite interesting story about the tools in cyber attacks.
Also Read : Most Popular Hacking Tools in Kali Linux
Researchers at LongHorn have concluded & relate 40 cyber attacks that were made in 16 countries. According to the these attacks were conducted by a cyber group called LongHorn. They also said that the details in the document of Vault 7 & LongHorn have a very high resemblance. many technical specifications are matched totally.

40 cyber attacks
40 cyber attacks

Conclusion by Symantec Researchers

LongHorn is using Trojans and 0-day bugs attacks to many government firms , telecoms & IT firms since 2010.
After all these conclusion Symantec researchers said in a blog post that Vault 7 activities & LongHorn activities are done by a some group & are somehow related to each other.
Vault 7 has described a tool called FluxWire which is developed on the base of Trojan. Another tool callen Corentry also belongs to LongHorn.
As many features of Corentry and the sample that is shown in Vault 7 document are apparently similar.
Another tool called archangel has a quite similar interface with LongHorn Tool called plexor backdoor.
The cryptographic methods of Vault 7 & Longhorn are also same. This includes AES & 32 bit key one key per connection. This practice prevents from MITM attacks.
LongHorn was first detected in 2014 by Symantec when they were using 0-day exploit to infect the host with plexor. After they analyze the attack , they knew that the attackers have good knowledge about the victim. The tools used in the attacks were Corentry, Plexor, Backdoor.Trojan.LH1, and Backdoor.Trojan.LH2.
Before the Vault 7 documents were released, Symantec have assumed the attakers as an informtion gathering group. But after the documents are released , the official statement of Symantec have chnaged & the link has gone through CIA.
They added “Taken in combination, the tools, techniques, and procedures employed by Longhorn are distinctive and unique to this group, leaving little doubt about its link to Vault 7.”
Also Read : What is the best way to backup your Smartphone data -Android phone or iPhone
That’s it for now. If you like Google Gboard Tips & tricks, please write a comment for us to let us know. Like us on Facebook or subscribe us to get all the daily updates from us. Thank You.


  1. Songer45172
    May 28, 2017

    Great goods from you, man. I’ve understand your stuff previous to and you are just extremely excellent. I really like what you have acquired here, really like what you’re stating and the way in which you say it. You make it entertaining and you still take care of to keep it smart. I cant wait to read far more from you. This is actually a terrific web site.

  2. Rockypunks
    May 28, 2017

    The signature of CIA Attack & the cyber attack , ransomware are connected to each other , I could be wrong tell your opinions

  3. solicitor
    May 29, 2017

    Thanks for your personal marvelous posting! I seriously enjoyed reading it, you’re a great author.I will ensure that I bookmark your blog and will often come back later in life. I want to encourage you to continue your great writing, have a nice afternoon!

  4. kenneth
    June 5, 2017

    This could be connected point where CIA & some other hacker association have done something with their joint efforts

  5. maxwelle
    June 5, 2017

    I Read all your posts daily , this found to be updated all the news of Website

  6. markee
    June 8, 2017

    Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your weblog? My blog is in the exact same niche as yours and my visitors would certainly benefit from some of the information you provide here. Please let me know if this okay with you. Cheers!|

  7. Thomas
    August 18, 2017

    Great post! Have nice day ! 🙂 07l9f

Leave a Comment