Items tagged with CIA

Every so often, WikiLeaks publishes top-secret documents outlining various hacking tools and malware used by the United States Central Intelligence Agency (CIA). Most of the documents we have seen are presumably outdated, but for obvious reasons, the CIA would still like to keep them under lock and key. The agency would also like to arrest the person responsible for providing the documents to Wikileaks, and has identified a possible suspect. That person is Joshua Adam Schulte, a former employee of a CIA group tasked with programming code to spy on foreign threats, The Washington Post reports. Federal... Read more...
US Intelligence officials have determined that phones and services provided by Huawei, a Chinese smartphone manufacturer in China, and Chinese telecom ZTE pose a security risk to Americans, and that consumers should avoid both companies altogether. The determination was made known by half a dozen US intelligence chiefs, each of which told the Senate Intelligence Committee on Tuesday that Americans should steer clear of both companies. Among the six top intelligence chiefs were the heads of the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and National Security Agency... Read more...
Amazon Web Services (AWS) has grown to be the leading player in on-demand cloud computing across the internet, and provides a sizable stream of revenue for the retail giant. AWS has a number of premier clients for its services including Google and even Comcast. However, AWS is furthering its reach into the lucrative government sector by expanding its GovCloud. The new AWS “Secret Region” will provide cloud services to U.S. intelligence agencies -- including the CIA -- at the “secret” security classification level. For inquiring minds, that is a step below the "top... Read more...
The latest documents from Vault 7, a collection of confidential materials related to hacking tools used by the United States Central Intelligence Agency and obtained by WikiLeaks, was made public today by the whistle blowing organization. This newest leak details the CIA's Angelfire project, which is a persistent framework that can load and execute custom malware on computers running Windows XP and Windows 7.Angelfire consists of five components, including Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS,a nd the Windows Transitory File system. Each of these parts has a distinct job.... Read more...
WikiLeaks, the non-profit organization that publishes secret information provided by anonymous sources, released details about a tool that was used by the United States Central Intelligence Agency (CIA) to ensure that other government intelligence agencies were sharing the biometric information they collected. That includes the Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Department of Homeland Security (DHS). That's right, the CIA has (or had) a tool to spy on the government's spy agencies. The tool is called ExpressLane and it would be installed and run under the... Read more...
Here we go again. WikiLeaks, the international non-profit whistleblower that publishes secret information to the web, has been dumping classified documents outlining various hacking tools and malware used by the United States Central Intelligence Agency. These documents are part of what WikiLeaks calls Vault 7, the latest of which contains information on the CIA's "CouchPotato" tool. According to WikiLeaks, CouchPotato is a remote tool for intercepting video streams as either an AVI video file or capturing still images of frames from the stream as JPEGs, presumably to save space. In the latter... Read more...
Another hacking tool used by the United States Central Intelligence Agency (CIA) has been revealed by WikiLeaks, the non-profit organization that often publishes secret documents obtained by anonymous sources. The latest set of documents comes from Wikileaks' Vault 7 collection of CIA malware tools and describes a utility for access webcams and microphones on certain Windows systems. Called Dumbo, the tool was not developed for spying on targets but to corrupt recordings from webcams and microphones where the deployment a special group within the CIA's Center for Cyber Intelligence could be compromised.... Read more...
For the past several months, WikiLeaks has been publishing information related to exploits and hacking tools that had been used by the United States government at some point. The project is known as Vault 7 and seems to contain mostly older exploits, though it is not clear if some of the malware has been updated for modern platforms. Not all of it is aimed at Windows. In fact, the latest documents reference macOS and Linux hacks that were part of the US Central Intelligence Agency's Imperial program.Image Source: Flickr (Tony Webster)The first of these is called Achilles. According to the documentation,... Read more...
WikiLeaks has published another set of leaked documents from the United States Central Intelligence Agency (CIA). This latest leak is part of WikiLeaks' Vault 7 batch and details a malicious app for Android devices called HighRise. Also called TideCheck, this app allows a remote hacker to redirect or intercept SMS text messages that are sent to a target's cellular phone, and have those communications forwarded to a remote web server.This appears to be an old tool that was used by the CIA, or at least the version described in the leaked documents is an older piece of malware. The accompanying manual... Read more...
Another day, another government spying exploit rises to the surface courtesy of Wikileaks, this time originating from the CIA. This WikiLeaks data dump specifically lets us know of a CIA-engineered spying tool called OutlawCountry (no space), which, interestingly enough, explicitly targets Linux users. You know, those digital freedom loving passionate penguin peeps that appreciate having great control over their computer? But don't worry, the CIA has targeted Windows users en masse in the past as well; absolutely no one has proven safe and they obviously don't discriminate. OutlawCountry... Read more...
WikiLeaks has published secret documents belonging to the United States government that reveal the Central Intelligence Agency (CIA) has been building and maintaining cyber tools designed to compromise wireless routers. These tools are the work of the CIA's hacking unit called Engineering Development Group. Among them is a specialized firmware referred to as Cherry Blossom. "The wireless device itself is compromized by implanting a customized Cherry Blossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful... Read more...
WikiLeaks has posted its latest release from the Vault 7 series of CIA-related leaks that exposes a tool dubbed “Athena”, which acts as a beacon on compromised Windows-based systems and gives the agency remote loader capabilities as well.Athena and its associated tools function on all versions of Windows from XP through Windows 10. There is a secondary implementation named “Hera” for Windows 8 and newer systems, due to some underlying changes Microsoft made to the OSes, which offers all of the same capabilities. All told, Athena / Hera provides a beaconing capability with remote configuration and... Read more...
WikiLeaks isn’t done exposing the CIA’s arsenal of hacking tools used to infiltrate computer systems around the globe. Last month, we told you about Weeping Angel, which targeted select Samsung Smart TVs for surveillance purposes. Today, we’re learning about Archimedes, which attacks computers attached to a Local Area Network (LAN). Although we have no way of knowing whether Archimedes is still in use by the CIA, the details of how it is unleashed on unsuspecting parties has been revealed in full. In its teaser announcing the exploit, WikiLeaks writes, “It allows the re-directing of traffic from... Read more...
Back in early March, WikiLeaks gave the world an early glimpse into just a small sample of the hacking arsenal at the disposal of the CIA. As part of WikiLeaks’ “Vault 7” dump, we were made privy to software hacks that targeted Android- and iOS-based smartphones, Windows- and OS X-based PCs and even Samsung smart TVs. Today, WikiLeaks released the CIA’s actual user guide for “Weeping Angel”, the exploit use to hack Samsung smart TVs. We’ve also learned that Weeping Angel is actually based on another piece of malware, “Extending”, that was developed by the British MI5 spy agency. Weeping Angel (and... Read more...
1 2 3 4 5 Next ... Last