Skip to content

Had a look at one of those CIA jars #203

Open
@quat1024

Description

@quat1024

Hi, I read about your research through the 404 Media article and noticed you wanted to look inside the Java archives. I have a little experience with Java reverse engineering so I peeked at the update.jar linked from newsupdatesite.com.

This is a summary of my results: https://notes.highlysuspect.agency/cia-jars.html

I'm not finished yet and I haven't found any exciting "smoking guns" or anything, but I did find:

  • There is really basic string obfuscation ran over all the string constants in the jar, which is why grepping didn't turn up much
  • applet.configs is also obfuscated with a little XOR encryption, the key is derived from the first eight bytes of the file
    • Deobfuscated, the file includes a date: #Fri Feb 05 12:04:29 EST 2010
  • The jar includes, among other things, a very old copy of the org.json/JSON-java library and a (bespoke?) Base64 encoder/decoder
    • During this time org.json included the "The Software shall be used for Good, not Evil." clause in the license. Haha.

If you want to apply my partially complete Enigma mappings you can

  • download Enigma from here (the -all.jar) and launch it
  • clone this
  • go to File -> Open Jar and select update.jar
  • go to File -> Open Mappings -> Enigma Directory and select my newsupdatesite-update directory

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions