Made with Love

CIA Hacking Tools Revealed

Anonymous69

Senior Member
Joined
May 28, 2013
Messages
1,211
Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details)

CIA malware targets Windows, OSx, Linux, routers
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

CIA 'hoarded' vulnerabilities ("zero days")
In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.

'Cyberwar' programs are a serious proliferation risk
Cyber 'weapons' are not possible to keep under effective control.


While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.

U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.


CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"

How the CIA dramatically increased proliferation risks
In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.


The CIA made these systems unclassified.

Evading forensics and anti-virus
A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.


"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time.

Read it all: Vault7 - Home
 
Guido said:
Is Boing going to ask for the Cole notes :unknw::-Cool/"

I started to write them, but the whole article is worth reading.
 
Well a spying agency having spying capabilities is to be expected. That's not the issue. The issue is it's now public knowledge. This is a perfect example of why the Feds should not have a backdoor to anything.

Unless you're using a hardened version of Debian Linux..you're probably very insecure just surfing the internet.
 
:SayWhat?::Crying/:

Too long to read it all.

Ok Boing, here you go:

CIA Hacking Tools Revealed
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

CIA malware targets iPhone, Android, smart TVs


CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

CIA 'hoarded' vulnerabilities ("zero days")

'Cyberwar' programs are a serious proliferation risk


Cyber 'weapons' are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.


Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.
 
Ok Boing, here you go:

CIA Hacking Tools Revealed
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

CIA malware targets iPhone, Android, smart TVs


CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

CIA 'hoarded' vulnerabilities ("zero days")

'Cyberwar' programs are a serious proliferation risk


Cyber 'weapons' are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.


Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

Thank you Lori.

/-Thumbs-up::/
 
Thank you Lori.

/-Thumbs-up::/

All those years of sitting alone reading in my room because I was too shy to interact with people, paid off with stellar reading comprehension skills.

I learned how to write a 'Precis' in grade 12 English. That's when you take a long paragraph and condense it down into one or two sentences.

:wink2:
 
Many devices now contain microphones and cameras; backdoors are something many programmers have always put into their software. I am sure that these are just security issues.

Programmers in major corporations wouldn't do such a thing, but I believe there will be a time when corporations and the government will work together in cataloging and recording every human.
 
It baffles me that people would buy something like the Amazon Echo so they could ask Alexa a question. You've got a device, sitting in your house that is waiting to listen to you. Same goes for these kids dolls that the kids can speak too. They've been found to record and even listen.

Sign up at Shodan.io and learn how to use it. You can watch hacked TVs, baby cams, etc, etc. I use it to test my clients security and I have found clients who are listed. Just say no to technology.

PS. As a side note. With cars being able to be hacked now, how long until the Feds decide to kill an enemy by hacking the car & causing it to crash? I follow a couple of hackers on Twitter who hacked a Jeep while it was in motion. Interesting shit but pretty damn scary.
 
It baffles me that people would buy something like the Amazon Echo so they could ask Alexa a question. You've got a device, sitting in your house that is waiting to listen to you. Same goes for these kids dolls that the kids can speak too. They've been found to record and even listen.

Sign up at Shodan.io and learn how to use it. You can watch hacked TVs, baby cams, etc, etc. I use it to test my clients security and I have found clients who are listed. Just say no to technology.

PS. As a side note. With cars being able to be hacked now, how long until the Feds decide to kill an enemy by hacking the car & causing it to crash? I follow a couple of hackers on Twitter who hacked a Jeep while it was in motion. Interesting shit but pretty damn scary.

They are even in vibrators.

In a settlement filed Thursday in Chicago federal court, the Canadian company called We-Vibe agreed to pay $5 million CDN (about $3.75 million) to resolve privacy claims regarding "adult sensual lifestyle products" that transmitted customer data.
The toys in question, which include the We-Vibe Classic and Rave by We-Vibe, are designed to be used by couples, allowing one partner to control the devices via Bluetooth and a smartphone app.

Sex Toy Maker Settles '''Smart''' Vibrator Lawsuit | Fortune.com
 
They are even in vibrators.

In a settlement filed Thursday in Chicago federal court, the Canadian company called We-Vibe agreed to pay $5 million CDN (about $3.75 million) to resolve privacy claims regarding "adult sensual lifestyle products" that transmitted customer data.
The toys in question, which include the We-Vibe Classic and Rave by We-Vibe, are designed to be used by couples, allowing one partner to control the devices via Bluetooth and a smartphone app.

Sex Toy Maker Settles '''Smart''' Vibrator Lawsuit | Fortune.com


Hmmmmmm
 
Back
Top Bottom