Browsing tag

CIA

Vault 7 Leaks: CIA Conducts Secret Cyber Operation “ExpressLane” Against Their Intelligence Partners -WikiLeaks

WikiLeaks Revealed a new document of CIA Secret operations called “ExpressLane” that conducts against CIA’s information sharing Service Partners (liaison services) like NSA,DHS ,and FBI. These Secret operation Performing for collecting the BioMetric Information around the World by helping of CIA’s own biometric collection system Branch called OTS (Office of Technical Services). Few days before CIA Hacking Tool Revealed, […]

WikiLeaks: CIA’ CouchPotato Tool Remotely Collects Video Streams

WikiLeaks has released yet another CIA hacking tool as part of its Vault 7 series documents belonging to the American Central Intelligence Agency (CIA). This time, the whistleblowing platform has leaked the “User Guide for the CoachPotato project” of the agency work of which is to hack and obtain RTSP/H.264 video streams and still images remotely. The project CouchPotato is different from Dumbo […]

Vault 7: CIA’ Dumbo Project Hijacking Webcams and Microphones

The Vault7 saga is far from over, and every passing week we are being introduced to a new set of tricks and tools that were allegedly used by the CIA for invading the privacy of security systems. CIA’s Dumbo Project is a system designed to manipulate Microphones, webcams and similar other devices installed on Microsoft […]

WikiLeaks Release Documents on How CIA Uses 5 Different Malware

WikiLeaks has released a trove of data belong to the American intelligence agency CIA (Central Intelligence Agency) – The latest batch shows how CIA uses five different malware to target unsuspecting users.  These malware are called HammerLoss, Regin, HTTPBrowser, NfLog, and Gamker – The documents also show how CIA used Raytheon Blackbird Technologies, a contractor for the […]

5 New CIA Malware Unveiled By WikiLeaks — HTTPBrowser, NfLog, Regin, HammerLoss, Gamker

Short Bytes: As a part of the ongoing CIA Vault 7 series, WikiLeaks has published some new documents. The leaks share details regarding CIA’s partnership with Raytheon Blackbird Technologies, which helped CIA with insights into the malware development. The documents also briefly describe 5 CIA-Raytheon malware and their attack vectors. Since early 2017, whistleblower website WikiLeaks […]

Vault 7 Leaks : CIA Owned PoC Malware Development Surveillance Projects “UCL Under Raytheon” Leaked – WikiLeaks

WikiLeaks Revealed CIA Surveillance Projects Documents “UMBRAGE Component Library(UCL)”  from CIA contractor Raytheon Blackbird Technologies which contains five secret Malware Development Related PoC(Proof-of-Concepts) with CIA. This CIA Project Related to Malware research and Developing new Malware that mostly contains Proof-of-Concept ideas and assessments for malware attack vectors. Defense contractor company Raytheon helps for CIA Surveillance Project […]

Highrise: How This CIA Malware Spies And Steals User Data Using SMS

Short Bytes: The latest WikiLeaks Vault 7 leak deals with an Android malware that doesn’t need the internet to talk to the CIA servers and spy on the users. Named Highrise, this malware acts as an SMS proxy to send stolen data. Highrise works on Android version 4.0-4.3; it’s installed under the name TideCheck.  Last week, we wrote […]

CIA Highrise Android Malware Spies On SMS Messages: WikiLeaks

WikiLeaks is back with yet another batch of Vault 7 related documents detailing the CIA’s (Central Intelligence Agency) hacking tools and programs targeting unsuspected users worldwide for large-scale cyber espionage. The latest leak exposes “Highrise,” a malware disguised as an app called TideCheck employed by CIA to target Android devices running on versions 4.0 and 4.3 – WikiLeaks has described the app as […]

CIA Implants Steal SSH Credentials From Linux & Windows Devices: WikiLeaks

The whistleblowing platform WikiLeaks is back with another batch of Vault 7 related documents exposing the alleged hacking tools and programs used by the American Central Intelligence Agency (CIA) to hack and spy on users worldwide. This time, WikiLeaks has dumped the details of two more hacking tools as part of its Vault 7 series. Like […]

CIA Malware Can Steal SSH Credentials, Session Traffic

WikiLeaks dumped today the documentation of two CIA hacking tools codenamed BothanSpy and Gyrfalcon, both designed to steal SSH credentials from Windows and Linux systems, respectively. Both tools are “implants,” a term the CIA uses to describe malware payloads. Once installed through various means on a target’s computer, these two implants hook into SSH-related processes […]

Vault 7 Leaks : CIA Hacking Tools “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

WikiLeaks Revealed Another CIA Cyber Weapons called “BothanSpy” and “Gyrfalcon” steals the SSH Credentials from both Windows and Linux Platform and both tools are performing in Different OS Platform and Different Attack vector. SSH (Secure Shell) Protocol is used for Communicate Network services securely from unsecured channel Especially for user Perform Remote Login and The standard TCP […]

Vault 7 Leaks : CIA Malware “OutlawCountry” Controls Linux Machine and Redirect the Victims Traffic into CIA Controlled Machine – WikiLeaks

WikiLeaks Revealed another Secret Document of  CIA Malware called “OutlawCountry” that targets Linux Running Machines which Control and Redirect all outbound network traffic on the target computer to CIA controlled machines. Few days Before WikiLeaks Revealed anather CIA Malware Called “ELSA” have an ability to Tracking Geo-Location information of Wi-Fi enabled Windows OS. According to Leaked Document  […]

Wikileaks Exposes CIA’ Linux Hacking, Geolocation Tracker Malware

As you may know, WikiLeakes has been releasing sensitive documentation associated with CIA’s hacking tools as part of its Vault 7 series. This time round, the whistleblowing website made public documentation related to two hacking tools called OutlawCountry and Elsa. OutlawCountry OutlawCountry is a tool that allows CIA to hack into Linux-based systems and perform […]

OutlawCountry: CIA’s Hacking Tool For Linux Computers Revealed

Short Bytes: Another day, another CIA hacking tool reveal. Wikileaks has published fresh documents that deal with the CIA’s hacking and spying on Linux machines using a malware strain called OutlawCountry. This tool consists of a kernel module that creates invisible netfilter table for creating new rules with iptables command. This way the operator is able […]

Vault 7 Leaks : CIA Malware “ELSA” Tracking Geo-Location of WiFi Enabled Windows Computers – WikiLeaks

WikiLeaks Revealed an another Document of  CIA Malware Called “ELSA” have an ability to Tracking Geo-Location information of WiFi enabled nearby Target Windows Computers based on the ESS (Extended Service Set) Data and Transfer the latitude, longitude information into 3rd Party Database. ELSA Malware Collecting the targeted WiFi Enabled  Computers Information as Metadata Format and […]

WikiLeaks’ Latest Dump Exposes CIA Hacking Tools for air-gapped PCs

As part of the Vault 7 series, WikiLeaks released a set of documents that is essentially a user manual for a set of hacking tools belonging to the CIA. The hacking tools are capable of infecting air-gapped PCs via USB drives and are collectively named as the Brutal Kangaroo. Brutal Kangaroo Brutal Kangaroo is not […]

CIA Hacking Tool “Brutal Kangaroo” Revealed to Hack Air-Gapped Networks by using USB Thumb Drives -WikiLeaks

Wikileaks Revealed Next CIA Hacking Tool called “Brutal Kangaroo” under Vault 7 Projects that Consists of 4 Powerful Malware Components which targets closed networks by air gap jumping using thumbdrives. WiliLeaks Vault 7 Project Revealed Few days Before CIA Cyber weapon CherryBlossom which is Specially Developed to compromise the Wireless Network Devices including wireless routers and access […]