5 New CIA Malware Unveiled By WikiLeaks — HTTPBrowser, NfLog, Regin, HammerLoss, Gamker

Short Bytes: As a part of the ongoing CIA Vault 7 series, WikiLeaks has published some new documents. The leaks share details regarding CIA’s partnership with Raytheon Blackbird Technologies, which helped CIA with insights into the malware development. The documents also briefly describe 5 CIA-Raytheon malware and their attack vectors. Since early 2017, whistleblower website WikiLeaks […]

Vault 7 Leaks : CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon” Leaked – WikiLeaks

WikiLeaks Revealed CIA Surveillance Projects Documents “UMBRAGE Component Library(UCL)”  from CIA contractor Raytheon Blackbird Technologies which contains five secret Malware Development Related PoC(Proof-of-Concepts) with CIA. This CIA Project Related to Malware research and Developing new Malware that mostly contains Proof-of-Concept ideas and assessments for malware attack vectors. Defense contractor company Raytheon helps for CIA Surveillance Project […]

CIA Highrise Android Malware Spies On SMS Messages: WikiLeaks

WikiLeaks is back with yet another batch of Vault 7 related documents detailing the CIA’s (Central Intelligence Agency) hacking tools and programs targeting unsuspected users worldwide for large-scale cyber espionage. The latest leak exposes “Highrise,” a malware disguised as an app called TideCheck employed by CIA to target Android devices running on versions 4.0 and 4.3 – WikiLeaks has described the app as […]

Vault 7 Leaks : CIA Android Hacking Tool “HighRise” Steals Data From Compromised Android Phones via SMS – WikiLeaks

WikiLeaks Revealed a CIA Secret Document of  Android Mobile Hacking Tool called “HighRise” steal the victims Android smartphones data and send to CIA Control server using SMS messages for communication between Victims and CIA Controlled listener posts. WikiLeaks Revealed Few days before Another CIA Cyber Weapons called “BothanSpy” and “Gyrfalcon” steals the SSH Credentials from […]

CIA Implants Steal SSH Credentials From Linux & Windows Devices: WikiLeaks

The whistleblowing platform WikiLeaks is back with another batch of Vault 7 related documents exposing the alleged hacking tools and programs used by the American Central Intelligence Agency (CIA) to hack and spy on users worldwide. This time, WikiLeaks has dumped the details of two more hacking tools as part of its Vault 7 series. Like […]

Vault 7 Leaks : CIA Hacking Tools “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

WikiLeaks Revealed Another CIA Cyber Weapons called “BothanSpy” and “Gyrfalcon” steals the SSH Credentials from both Windows and Linux Platform and both tools are performing in Different OS Platform and Different Attack vector. SSH (Secure Shell) Protocol is used for Communicate Network services securely from unsecured channel Especially for user Perform Remote Login and The standard TCP […]

Vault 7 Leaks : CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks

WikiLeaks Revealed another Secret Document of  CIA Malware called “OutlawCountry” that targets Linux Running Machines which Control and Redirect all outbound network traffic on the target computer to CIA controlled machines. Few days Before WikiLeaks Revealed anather CIA Malware Called “ELSA” have an ability to Tracking Geo-Location information of Wi-Fi enabled Windows OS. According to Leaked Document  […]

Wikileaks Exposes CIA’ Linux Hacking, Geolocation Tracker Malware

As you may know, WikiLeakes has been releasing sensitive documentation associated with CIA’s hacking tools as part of its Vault 7 series. This time round, the whistleblowing website made public documentation related to two hacking tools called OutlawCountry and Elsa. OutlawCountry OutlawCountry is a tool that allows CIA to hack into Linux-based systems and perform […]

WikiLeaks CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers

WikiLeaks Revealed another Document of  CIA Malware Called “ELSA” have an ability to Tracking Geo-Location information of WiFi enabled nearby Target Windows Computers based on the ESS (Extended Service Set) Data and Transfer the latitude, longitude information into 3rd Party Database. ELSA Malware Collecting the targeted WiFi Enabled  Computers Information as Metadata Format and then […]

Vault 7 Leaks : CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers – WikiLeaks

WikiLeaks Revealed an another Document of  CIA Malware Called “ELSA” have an ability to Tracking Geo-Location information of WiFi enabled nearby Target Windows Computers based on the ESS (Extended Service Set) Data and Transfer the latitude, longitude information into 3rd Party Database. ELSA Malware Collecting the targeted WiFi Enabled  Computers Information as Metadata Format and […]

WikiLeaks’ Latest Dump Exposes CIA Hacking Tools for air-gapped PCs

As part of the Vault 7 series, WikiLeaks released a set of documents that is essentially a user manual for a set of hacking tools belonging to the CIA. The hacking tools are capable of infecting air-gapped PCs via USB drives and are collectively named as the Brutal Kangaroo. Brutal Kangaroo Brutal Kangaroo is not […]

CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

Wikileaks Revealed Next CIA Hacking Tool called “Brutal Kangaroo” under Vault 7 Projects that Consists of 4 Powerful Malware Components which targets closed networks by air gap jumping using thumbdrives. WiliLeaks Vault 7 Project Revealed Few days Before CIA Cyber weapon CherryBlossom which is Specially Developed to compromise the Wireless Network Devices including wireless routers and access […]

Wikileaks Revealed New CIA Wireless Hacking Tool “Cherry Blossom” Compromise Your Wireless Network Devices using MITM Attack

Wikileaks Revealed another CIA Cyber weapon called “CherryBlossom” which is Specially Developed to compromise the Wireless Network Devices including wireless routers and access points (APs) by helping of Stanford Research Institute (SRI International). Wikileaks Vault 7 earlier released Hacking tool was Pandemic, that has ability to Replaced Target files where remote users use SMB to […]

Cherry Blossom: WikiLeaks’ Latest Dump Exposes CIA Wireless Hacking Tools

The whistleblowing site WikiLeaks is back with yet another Vault 7 series related document. This one is called “Cherry Blossom” program which gives a glance at the wireless hacking capabilities of The Central Intelligence Agency (CIA). The Cherry Blossom project according to the leaked documents was allegedly developed and implemented by the CIA with the […]

Wikileaks Vault 7 Releases New CIA Tool ‘Pandemic.’

The Latest release of Wikileaks Vault 7 Pandemic, which roles of a persistent implant for Microsoft Windows file server and can access by remotely to run programs.  The Project acts as Patient Zero.  To Access on Windows Machine Remotely. This Tool can delete your Data and upload Malicious Software. Pandemic can replace 20 programs with […]

Wikileaks reveals pandemic malware for Windows developed by the CIA

In its latest release as part of the Vault 7 series, WikiLeaks has apparently leaked a document which consists information regarding a new malware dubbed Pandemic, which is another CIA-built hacking tool. According to the document: Today, June 1st, 2017, WikiLeaks publishes documents from the “Pandemic” project of the CIA, a persistent implant for Microsoft […]

Vault 7: Wikileaks Exposes CIA’s Athena Malware, Hijacks Every Windows Version

On Friday, Wikileaks published a CIA malware project known as Athena. According to the leaked documents, the Athena malware is capable of hijacking all the Windows versions starting from XP to Windows 10. The malware consists of another module called Hera which affects PCs running Windows 8 to Windows 10. The malware is a collaborative effort between […]

WikiLeaks Reveals Athena CIA Spying Program Targeting All Versions of Windows

WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework – which “provides remote beacon and loader capabilities on target computers” – allegedly being used by the CIA that works against every version of Microsoft’s Windows operating systems, from Windows XP to Windows 10. Dubbed Athena/Hera, the spyware has […]

Sweden drop rape case probe against WikiLeaks’ Julian Assange

In a recent development, Swedish lawmakers have dropped the investigations against WikiLeaks founder, Julian Assange, which alleged him of rape back in August 2010. The decision will set free Assange after a 7-year legal stand-off. In a statement, the Prosecutors’ Office said that: “Chief Prosecutor Marianne Ny has today decided to discontinue the preliminary investigation regarding suspected […]

WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin

WikiLeaks recently leaked some files as part of its Vault 7 series, that contained user manuals for two malware called, Assassin and AfterMidnight. According to the documents, these viruses belong to the CIA. RELEASE: CIA remote control & subversion malware systems ‘After Midnight’ and ‘Assassin’ https://t.co/S64RmEsHYl #Vault7 pic.twitter.com/5fMTeqW007 — WikiLeaks (@wikileaks) May 12, 2017 [irp […]