10.05.2017 Views

PC_Advisor_Issue_264_July_2017

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

News: Analysis<br />

For the past few years, Intel has moved<br />

away from the once-famous ‘tick-tock’<br />

scaling, where new processes were ‘ticks’<br />

and new architectures were ‘tocks’. It<br />

is switching to what the company calls<br />

‘hyperscaling’ advances, a new metaphor<br />

announced at the event to describe<br />

manufacturing advances. Intel will now<br />

use the ‘+’ and ‘++’ symbols to mark<br />

advances in the 14- and 10nm processes.<br />

Hyperscaling will help Intel cram new<br />

architectural and process innovations<br />

without hurrying a move to a new<br />

manufacturing process.<br />

New lithography techniques such<br />

as quad-patterning will help Intel take<br />

advantage of the economic benefits<br />

described by Moore’s Law, explained Kaizad<br />

Mistry, vice president and co-director of<br />

logic technology development at Intel. That<br />

will improve transistor density, which also<br />

brings performance and power-efficiency<br />

enhancements. Intel is projecting 15<br />

percent improvements in performance<br />

with each advance in the 10nm ‘+’ and ‘++’<br />

processes. Intel will also reduce the chip<br />

size to pack I/O, logic and SRAM blocks<br />

into a much smaller area.<br />

Intel is doing what the company calls<br />

“aggressive pitch scaling”, which involves<br />

packing wires, transistors and 3D fins closer<br />

together. On the 10nm process, that helps<br />

provide transistor density improvement that<br />

is 2.7 times better than the 14nm process.<br />

The chipmaker is also bringing the ability<br />

to mix and match different cores into an<br />

integrated system-on-chip. The cores could<br />

be made using different manufacturing<br />

processes. It’s also much how ARM chips are<br />

designed and made, a process that integrates<br />

CPUs, modems, graphics processors and<br />

other cores into a single chip. J<br />

WikiLeaks: CIA used bits of Carberp<br />

Trojan code for malware deployment<br />

The CIA’s hacking operations allegedly borrowed elements from the Carberp<br />

financial malware when the code was leaked in 2013, writes Michael Kan<br />

W<br />

hen the source code to a suspected<br />

Russian-made malware leaked<br />

online in 2013, guess who used<br />

it? A recent release from WikiLeaks claims<br />

the US CIA borrowed some of the code to<br />

bolster its own hacking operations.<br />

In April, WikiLeaks released 27 documents<br />

that allegedly detail how the CIA customised<br />

its malware for Windows systems.<br />

The CIA borrowed a few elements<br />

from the Carberp financial malware when<br />

developing its own hacking tool known as<br />

Grasshopper, according to those documents.<br />

Carberp gained infamy as a Trojan<br />

program that can steal online banking<br />

credentials and other financial information<br />

from its victims’ computers. The malware,<br />

which likely came from the criminal<br />

underground, was particularly problematic<br />

in Russia and other former Soviet states. In<br />

2013, the source code was leaked, sparking<br />

worries in the security community that<br />

more cybercriminals might use the malware.<br />

The WikiLeaks release includes<br />

supposed CIA user manuals that show the<br />

agency took an interest in the malware,<br />

especially with the way it can survive and<br />

linger on a Windows <strong>PC</strong>.<br />

“The persistence method, and parts of the<br />

installer, were taken and modified to fit our<br />

needs,” the US spy agency allegedly wrote in<br />

one manual, dated January 2014.<br />

It’s unclear why the agency chose<br />

Carberp. However, the borrowed elements<br />

were only used in one ‘persistence module’<br />

meant for the CIA’s Grasshopper hacking<br />

tool. That tool is designed to build custom<br />

malware configured with different payloads,<br />

according to a separate document.<br />

The WikiLeaks’ release describes several<br />

other modules that work with Grasshopper<br />

to let malware persist on a <strong>PC</strong>, such as by<br />

leveraging Windows Task Scheduler or a<br />

Windows registry run key. However, no actual<br />

source code was included in the release.<br />

Nevertheless, the documents will probably<br />

help people detect the CIA’s hacking tools,<br />

which is WikiLeaks’ intention in releasing the<br />

classified information.<br />

In March, WikiLeaks began releasing a<br />

trove of secret files allegedly obtained from<br />

the CIA. Those first leaks described how the<br />

agency has a library of hacking techniques<br />

borrowed from malware out in the wild.<br />

The US spy agency has so far declined to<br />

comment on the authenticity of WikiLeaks’<br />

document dump. J<br />

IMAGE: CIA<br />

<strong>July</strong> <strong>2017</strong> www.pcadvisor.co.uk/news 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!