Wikileaks reveals details of CIA's 'Brutal Kangaroo' toolkit for attacking air-gapped networks

clock • 2 min read

Brutal Kangaroo is a CIA tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumb drives

Wikileaks has revealed yet more information about the CIA's trove of malware tools, including information about how the US intelligence agency taps into 'air gapped' networks.  "Brutal Kangaroo ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Google Chrome can now make its own decisions on your safety

Internet

The browser's newest version can act by itself to snip out unwanted permissions

clock 13 September 2024 • 1 min read
Linux hits new heights as desktop market share climbs

Operating Systems

Despite Linux's growth, Windows remains the dominant desktop operating system

clock 23 August 2024 • 3 min read
Malware campaign hijacks hundreds of thousands of browsers

Threats and Risks

Forcibly installs malicious browser extensions and alters core browser files

clock 12 August 2024 • 3 min read
Most read
01

Ransomware targets London branch of China's ICBC

13 September 2024 • 2 min read
02

Teen arrested over TfL cyberattack

13 September 2024 • 3 min read
03

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read