WikiLeaks’ latest release from the Vault 7 series of CIA leaks, sheds more light on how ordinary people can be easily tracked and targeted by the US intelligence agency through everyday electronic devices.
Since March 7, WikiLeaks has revealed CIA hacking techniques used to weaponize mobile phones, conduct surveillance via smart TVs, and load and execute malware on a ‘target machine’.
READ MORE: Dumbo: WikiLeaks reveals CIA system to take over webcams, microphones
In light of Thursday’s 20th release from Vault 7, RT looks back at the most explosive revelations from the CIA’s hacking arsenal, showing how the intelligence agency could spy on you in your own home.
Home Security Systems
The ‘Dumbo’ program is purportedly designed to manipulate home security systems, altering the functionality of webcams and microphones on Microsoft Windows-operating systems and corrupting video recordings.
WikiLeaks suggested that this allows the operator to create fake – or destroy real – evidence of their intrusion into the device.
#Dumbo: @wikileaks reveals CIA system to take over webcams, microphones #Vault7https://t.co/96UPWSTex2
— RT (@RT_com) August 3, 2017
Smart TVs
Many of the exploits revealed through the leaked Vault 7 documents appear designed to target ordinary individuals through commonly used devices.
READ MORE: WikiLeaks publishes #Vault7: ‘Entire hacking capacity of the CIA’
The CIA allegedly has access to a range of tools that even target Samsung TVs under its ‘Weeping Angel’ program. The project involves infiltrating the smart TVs to transform them into covert microphones, which can record and store audio.
#CIA hid ability to #hack smart phones and TVs worldwide from makers, despite #Obama pledge to reveal https://t.co/K7wFTdlC82#Vault7
— WikiLeaks (@wikileaks) March 7, 2017
Android devices
Google’s Android operating system was found to have 24 ‘zero days’ – the codename used by the CIA for tools to identify and exploit vulnerabilities and secretly collect data on individuals.
The OS is used in 85 percent of the world’s smart phones, including Samsung and Sony.
By exploiting gaps in the OS, it’s possible to access data from social messaging platforms, including WhatsApp, Weibo, Telegram and Signal before encryption is applied.
#WikiLeaks#Vault7: WhatsApp, Signal, Telegram, Wiebo also hacked before encryption applied https://t.co/O4FdrExAmS
— RT (@RT_com) March 7, 2017
Another program appears specifically designed to target mobile devices running Android 4.0 to 4.3, allowing a third party to intercept and redirect SMS messages.
#Vault7 WikiLeaks release ‘HighRise’, SMS redirector appears as app on phone named ‘TideCheck’ pic.twitter.com/28W5lptpQQ
— Colm McGlinchey (@ColmMcGlinchey) July 13, 2017
READ MORE: CIA can intercept & redirect SMS on Android, according to ‘Highrise’ document
Apple products
Apple products are not immune to the CIA’s hacking tools either. In fact, Vault 7 revealed a specific division dedicated to the hacking of Apple devices .
A tool known as ‘NightSkies’ specifically targets Apple products including the iPhone and Macbook Air. It purportedly even allows the CIA to infiltrate factory-fresh iPhones and track and control them remotely, providing “full remote command and control.”
WiFi
WiFi can be easily exploited by the agency for spying, according to a number of leaks. One program called Cherry Blossom allegedly targets WiFi devices to monitor, control and manipulate the Internet traffic of connected users.
No physical access is needed to implant the firmware on a wireless device, as some devices allow their firmware to be upgraded over a wireless link.
‘Cherry Blossom’: @wikileaks reveals CIA wireless network targets. #Vault7https://t.co/tPssm3jHBspic.twitter.com/hkkG4Myomg
— RT America (@RT_America) June 15, 2017
Another malware called Elsa tracks WiFi-enabled devices running Microsoft Windows, allowing the CIA to gather location data on a target’s device and monitor their patterns and habits.
The malware allows the CIA to track the geo-location of wifi-enabled devices even when they are not connected to the internet.
READ MORE: #Vault7: CIA’s secret cyberweapon can infiltrate world’s most secure networks
Microsoft
Most of the malware referenced throughout the leaks is designed for use on the widely popular Microsoft Windows operating systems.
Many of these programs focus on uploading the malware via removable devices such as USB drives. Some, such as the ‘brutal kangaroo’ project, are designed to hide themselves from detection, and can even infect devices that have never been connected to the internet by air gap jumping.
ATTENTION READERS
We See The World From All Sides and Want YOU To Be Fully InformedIn fact, intentional disinformation is a disgraceful scourge in media today. So to assuage any possible errant incorrect information posted herein, we strongly encourage you to seek corroboration from other non-VT sources before forming an educated opinion.
About VT - Policies & Disclosures - Comment Policy
Comments are closed.